website statistics

Twitter has hired Charlie Miller, a notable hacker who has earned fame by unveiling many major vulnerabilities in iOS.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

Tech companies often hire hackers so that they could use their skills to devise better security measures. This often works since it takes a close knowledge of vulnerabilities to be able to patch them – and these hackers know them very well. One such hacker, Charlie Miller, has become a part of Twitter’s security team now.


Charlie Miller

Charlie Miller is widely known in the iOS world as a mastermind who has been able to figure out many security flaws in iOS. Miller wrote from his Twitter account, “Monday I start on the security team at Twitter. Looking forward to working with a great team there!”

Apparently, Twitter is trying to find out vulnerabilities that may exist in its systems and then fix them. Hiring Miller may be a part of this strategy. Miller has many achievements to his name. He was able to exploit an iPhone through its browser and compromised a MacBook Air within two minutes. He has tested out the security systems of many security firms in the past and won the Pwn2Own hacking competition in Vancouver.

When it comes to iPhone, Miller has many landmark hacks to his name. For instance, back in 2009, he was able to hijack an iPhone with the help of a text message. He was also able to have an iOS app added to the App Store despite all Apple security measures. Apple later revoked his developer license for having done so.

In recent months, we have seen Twitter go to great pains to ensure the privacy and security of its users’ data, something which is highly commendable. Hiring Miller also shows that it is serious in its commitment to safeguard the data. It is very significant in that Miller represents that elite crop of hackers which can virtually break into any system – and by having him on board, we can surely expect that Twitter will be far more secure in the coming days.

Courtesy: Forbes

Buy Cheapest Related Product From Amazon.com


Half Of Android Devices Are Vulnerable, Need To Be Patched

Motorola Products May Face A Ban In Germany
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On September 15, 2012(3 years, 11 months ago.)

You May Also Like:

What Do You Think?

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

Check out this tutorial to know how to install Apple watchOS 3 beta certificate on your Apple Watch and start enjoying the new version.
If you are trying to jailbreak iPhone, iPad or iPod on iOS 9.2 - 9.3.3 without using a computer or Apple ID, then check this video tutorial.
Pokemon Go users are complaining about the crashing and server issues. Check out the tutorial to solve error problems and thanks us later.
Turning off Wi-Fi Assist is a great way to save mobile data since it automatically starts using cellular data when Wi-Fi signal is poor .
If you want to secure your SIM card from others using it, then check out this tutorial to know how to set up the SIM Pin code on your iPhone.
CiderTV is a great alternative to control Apple TV from the Notification Center. Check out this tutorial to set up CiderTV on your iPhone.
Are you annoyed by the split screen mode on the iPhone 6 Plus or 6s Plus? Check out this quick tutorial to turn off split screen feature.
If you could not wait to installed the iOS 10 beta version on you iPhone and now struggling for the errors, then this tutorial is for you.
Siri might not understand the question you asked. But you can use Siri by editing the text that you asked & it will give an updated answer.
Perhaps, you are new Apple user and you might have no idea how to change name of your iPhone. Check out this tutorial to change the name.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook