website statistics
Twitter has hired Charlie Miller, a notable hacker who has earned fame by unveiling many major vulnerabilities in iOS.

Your Gadget shopping list for Holiday?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

Tech companies often hire hackers so that they could use their skills to devise better security measures. This often works since it takes a close knowledge of vulnerabilities to be able to patch them – and these hackers know them very well. One such hacker, Charlie Miller, has become a part of Twitter’s security team now.

Charlie Miller

Charlie Miller is widely known in the iOS world as a mastermind who has been able to figure out many security flaws in iOS. Miller wrote from his Twitter account, “Monday I start on the security team at Twitter. Looking forward to working with a great team there!”

Apparently, Twitter is trying to find out vulnerabilities that may exist in its systems and then fix them. Hiring Miller may be a part of this strategy. Miller has many achievements to his name. He was able to exploit an iPhone through its browser and compromised a MacBook Air within two minutes. He has tested out the security systems of many security firms in the past and won the Pwn2Own hacking competition in Vancouver.

When it comes to iPhone, Miller has many landmark hacks to his name. For instance, back in 2009, he was able to hijack an iPhone with the help of a text message. He was also able to have an iOS app added to the App Store despite all Apple security measures. Apple later revoked his developer license for having done so.

In recent months, we have seen Twitter go to great pains to ensure the privacy and security of its users’ data, something which is highly commendable. Hiring Miller also shows that it is serious in its commitment to safeguard the data. It is very significant in that Miller represents that elite crop of hackers which can virtually break into any system – and by having him on board, we can surely expect that Twitter will be far more secure in the coming days.

Courtesy: Forbes

Buy Cheapest Related Product From

Half Of Android Devices Are Vulnerable, Need To Be Patched

Motorola Products May Face A Ban In Germany
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On September 15, 2012(3 years, 2 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook