HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
HOTforSecurity
  • Home
  • Threats
    • Security alerts
    • Social Networks Security
    • Mobile & Gadgets Security
    • Tips and Tricks
  • Smart Home Security
  • Digital Privacy
    • Digital Identity
    • Good Practices
    • Data Breach Alerts
  • Work from Home: Safety Tips
  • The ABC of Cybersecurity
  • Security Videos
Graham CLULEY @gcluley
4 Comments
    Share This!
  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • ReddIt
Industry News

Clinton campaign chief tweets “Vote Trump”, after his account is hacked

October 13, 2016
3 Min Read
Source: pixabay.com

Hillary Clinton’s campaign to become to the next President of the United States might be ahead of Donald Trump in the polls, but that doesn’t mean everything is going its way.

Take, for instance, the campaign’s computer security.

In recent days Wikileaks has been releasing thousands of messages hacked from within the Clinton camp, including messages sent and received by Clinton campaign chairman John Podesta.

Some of the released messages have, undoubtedly, made for embarrassing headlines and have prompted allegations that the information Wikileaks has released were stolen by Russian hackers keen to bolster Trump’s chances of election.

There is certainly some irony in the Republican party taking advantage of the archive of private emails, when it has previously denounced Wikileaks for publishing classified government and military secrets about the wars in Iraq and Afghanistan. But hey, there’s an election to win, right? The gloves are off.

podesta-tweet
Source: Twitter

And then, yesterday evening, Clinton campaign chief John Podesta tweeted what must have been a surprising turn of events, even in the most dramatic of presidential races:

I’ve switched teams. Vote Trump 2016. Hi pol

Was John Podesta really switching allegiances from Democratic Clinton to Republican rival Trump? No, of course not!

Instead, Podesta was just the latest high profile Twitter user to find that his account had been hacked, with mischievous tweets sent to his followers.

As International Business Times reports, campaign spokesperson confirmed to media travelling with the group to an event in Las Vegas that the message was the result of a hack:

“We can confirm that John’s Twitter account was hacked, which would explain the message you all disembarked from the plane and received. We’re working on fixing it.”

For understandable reasons, the tweet was swiftly deleted – but not before it had been liked, retweeted and screengrabbed by bemused Twitter users.

Separately members of the Anonymous hacking collective tweeted an image that purported to show they had gained access to Podesta’s Apple ID – again exhibiting that it was not benefiting from the additional protection offered by two-factor authentication.

podesta-apple

It’s easy to deduce that the hacks of Podesta’s Apple ID and Twitter account have come about as a result of his personal email archive being published by Wikileaks.

Whether Podesta’s personal Gmail account was hacked because he made the mistake of reusing passwords, chose an easy-to-guess password, was phished or fell victim to password-stealing malware is unclear.

But what does seem likely is that he did not have sufficient defences in place to protect what was a highly-prized email account.

Gmail offers features such as two-factor authentication, to make it much harder for hackers to break in and steal information.

Similar defences are available for Twitter and Apple’s iCloud, helping to prevent hackers from gaining unauthorised access to accounts even if they do manage to determine a user’s password.

With the spate of hacks and the heightened rivalry between the Republican and Democratic camps, it would seem sensible for staff on both sides to ensure that they had done everything possible to keep their communications secure and protect their accounts from being hijacked.

The risk, after all, is not just that hackers might jokingly suggest that you are switching teams – but that they could steal your personal information, or even damage an election campaign.

TagsJohn Podesta hacked Twitter account hacked

You may also like

Digital Identity • Digital Privacy • Industry News

NY Department of Financial Services Issues Cyber Fraud Alert to Auto Insurers

2 days ago
Digital Identity • Digital Privacy • Industry News

Japan Suffered Record Number of Privacy and Security Violations in 2020

3 days ago
Industry News

DoppelPaymer Gang Reportedly Attacked Kia Motors America with Ransomware

7 days ago

About the author

View All Posts

Graham CLULEY

Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats.

Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the "10 Greatest Britons in IT History" for his contribution as a leading authority in internet security.

4 Comments

Click here to post a comment
  • Ken Dowling says:
    October 14, 2016 at 12:37 pm

    What an idiot! Nobody should expect secrecy, privacy or security from a gmail account! Geez! It looks like his email will be easy to hack once the gmail credentials are released by hackers.

    • Janet says:
      October 17, 2016 at 7:22 pm

      Ken, please illuminate us as to what email account provider we SHOULD expect secrecy, privacy and security from.

  • Michael Ponzani says:
    October 14, 2016 at 5:13 pm

    Ha! Ha! Serves them right. Hoda Kotb of the Today Show had her phone # screen grabbed from her Apple smartwatch. 15,000 calls in two days.

  • Bob Dobbs says:
    October 17, 2016 at 12:17 am

    Actually, it's very simple. One of the wiki leaks emails had the password. That dumbass actually sent his Apple ID and password to an aide, and didn't even change it while the blue pill world was reading all the goodies. Btw, this 'Russia' narrative has got to stop. Obama and Hillary are poking around with WWW3, and bombing the sh*t out of Syria is not helping. Where's that in the MSM.

    Also, go to wiki leaks pod esta emails and search for Apple ID. It takes less than a minute.

G-7 emits cybersecurity guidelines for financial sector
Hackers escape with Vera Bradley customer data after POS hack
    Share This!
  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • ReddIt

Promo

1.3m
Fans
Like
▲ 46
104.8k
Followers
Follow
2.7k
Subscribers
Subscribe
18
Subscribers
subscribe
1.4m
Fans Love us

Recent shouts

  • Meurig Parri on Microsoft Ends Support for Windows 7. What You Need to Know
  • Kevin on Cable Haunt vulnerability affects millions of Broadcom cable modems
  • Terry on Ransomware attack forces Arkansas CEO to fire 300 employees days before Christmas
  • Martin on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre
  • Xander on 1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre

Time Machine

February 2021
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
« Jan    

ANTIVIRUS SOFTWARE FOR HOME USERS

Bitdefender Cybersecurity for Smart Home
Bitdefender Complete Protection
Bitdefender PC Protection
Bitdefender Antivirus for Mac
Bitdefender Mobile Security for Android
Bitdefender Product Comparison

BUSINESS SOLUTIONS

Bitdefender GravityZone Business Security
Bitdefender GravityZone Advanced Business Security
Bitdefender GravityZone Enterprise Security
Bitdefender Hypervisor Introspection

TOOLS & RESOURCES

Renewal for Business Customers
Trial Downloads
Free Antivirus
Free Online Virus Scanner
Free Virus Removal Tools
Live Remote Assistance
Free Tools
Bug Bounty
Press Center

Powered by Bitdefender - a leading cyber security technology provider | Copyright © 2008 - 2016. All rights reserved.
  • Home
  • The Team
  • Terms and Conditions
  • Contact
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok