Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

Imagine that you are the CEO of a mass media organization whose Twitter has just been hacked and was now posting 20 spam-filled tweets every second. You’ve just put yourselves in the shoes of Tim Armstrong, CEO of now-Verizon-subsidiary AOL.

The hackers responsible composed these tweets to include links, seemingly from the massive Chinese search engine Baidu, that directed to a fraudulent TMZ article that was actually an advertisement for a weight loss supplement. While this link was possibly intended to generate revenue for the hackers, it certainly generated plenty of amusement. Many observers tweeted online security advice to the CEO, “thanked” Armstrong for the recommendation, or poked fun at AOL’s precarious financial situation.

However, the first set of observers mentioned here make a good point--the CEO of an online media company should have implemented the security measures that could have potentially stopped this attack, and saved the company quite a bit of face. For example, Andrew Beaujon--senior editor of Washingtonian magazine--tweeted: “Looks like @timarmstrongaol should consider two-factor authentication on his Twitter account!”

Beaujon is absolutely right, too. Two-factor authentication is a simple method of preventing unauthorized and/or maliciously-motivated individuals from accessing online accounts that you (or your business) hold.

Armstrong’s Twitter has since been deactivated, although it is uncertain whether it was by Armstrong or by Twitter itself. Maybe next time he sets up an account, Armstrong will take some of the suggestions that were tweeted, to heart.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Google Privacy Email Workplace Tips Computer Workplace Strategy Collaboration Backup Small Business Hosted Solutions Users Ransomware AI Managed Service Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Compliance Cloud Computing Training Gadgets Covid-19 Outsourced IT Managed Service Provider Remote Work IT Support Server Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Wi-Fi Virtualization Blockchain Vendor Business Technology Bandwidth Mobile Office Managed Services Data Security Two-factor Authentication Apps Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Budget Marketing Conferencing Managed IT Services How To BDR Computing Physical Security Information Technology HIPAA Access Control Applications Office 365 Hacker Avoiding Downtime Password Website Bring Your Own Device Healthcare Operating System Big Data Virtual Private Network Risk Management Router Health Analytics Office Tips Augmented Reality Computers 2FA Retail Help Desk Storage Scam Data loss Managed IT Service Remote Workers Telephone Firewall Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Vulnerability Project Management Windows 7 Vendor Management The Internet of Things Cybercrime Microsoft 365 Social Display Solutions Printer Paperless Office Infrastructure Customer Service Document Management Windows 11 Monitoring Excel Professional Services Saving Time Mouse Virtual Machines Word Administration Downloads iPhone Licensing Robot Vulnerabilities Entertainment Data Privacy Settings Safety Wireless Printing Content Filtering Images 101 IT Management Telephone System VPN Multi-Factor Authentication YouTube Meetings Mobility Cost Management Cryptocurrency Computer Repair Employees Virtual Desktop LiFi Integration Customer Relationship Management Data storage User Tip Modem Mobile Security Processor Outlook Hacking Machine Learning Presentation Money Holidays Humor Data Storage Wireless Technology Smart Technology Supply Chain Video Conferencing Maintenance Antivirus Managed Services Provider Sports Distributed Denial of Service Workplace Social Engineering Gig Economy Screen Reader Education Service Level Agreement Internet Service Provider Recovery Computing Infrastructure Teamwork Hiring/Firing Remote Computing Regulations Compliance Hard Drives Mobile Computing Identity Evernote Paperless Co-managed IT Search Bookmark Domains Smart Tech Memes Tablet Download Net Neutrality Best Practice Alerts SQL Server Technology Care Alert Financial Data Refrigeration Managed IT History Buisness File Sharing Business Communications Dark Data IT solutions Break Fix Scams How To Browsers Smartwatch Public Speaking Legal Connectivity IT Upload Procurement Business Growth Azure Hybrid Work Notifications Lithium-ion battery Social Network Telework Cyber security Entrepreneur Travel Multi-Factor Security Tech Human Resources Google Maps Dark Web Cables Cortana CES Techology IoT Communitications Trends Supply Chain Management Alt Codes Customer Resource management FinTech Undo Regulations Downtime Unified Threat Management Google Calendar Term Google Apps Hosted Solution Microsoft Excel IT Maintenance Data Analysis Unified Threat Management Star Wars IT Assessment Gamification Flexibility Typing Staff Value Business Intelligence Network Congestion Organization Social Networking Legislation Shortcuts Ransmoware Knowledge Fileless Malware Digital Security Cameras Google Drive User Error Smart Devices Content Remote Working Application Wearable Technology Memory Vendors 5G Health IT Motherboard Data Breach Point of Sale Comparison Google Play Be Proactive Unified Communications Permissions Workforce Experience Directions Videos IBM Google Docs Assessment Electronic Health Records Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Monitors Google Wallet Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Username Windows 8 Managing Costs Amazon Laptop Websites Competition Drones eCommerce Black Friday SSID Virtual Assistant Outsource IT Electronic Medical Records SharePoint Database Surveillance IT Technicians Virtual Machine Environment Halloween Media Writing Proxy Server Reviews Lenovo Cookies Cyber Monday Medical IT User Hotspot Transportation Small Businesses Virtual Reality Tactics Development Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Fun Shopping Superfish Nanotechnology Optimization Identity Theft PowerPoint Addiction Deep Learning Language Employer/Employee Relationships Outsourcing Twitter IP Address Management PCI DSS Chatbots Error Navigation

Blog Archive