Close Menu
TechZappi

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Skylight Calendar 2 Brings Smarter Family Planning Into the Home

    January 8, 2026

    Google Classroom Turns Lessons into Podcasts with New Gemini Audio Feature

    January 7, 2026

    Hacktivist Erases Extremist Platforms in Real Time at Major Hacker Event

    January 5, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    TechZappi
    Subscribe Login
    • Home
    • AI

      Google Classroom Turns Lessons into Podcasts with New Gemini Audio Feature

      January 7, 2026

      Speaking Instead of Typing: A Fresh Look at AI Dictation Apps in 2025

      December 30, 2025

      How Data Centers Became a Frontline Issue in 2025

      December 24, 2025

      Adobe Expands Firefly With Text-Based Video Editing and New AI Model Integrations

      December 16, 2025

      State Attorneys General Demand Action on Harmful AI Responses

      December 10, 2025
    • Technology
      1. AI
      2. Cybersecurity
      3. Crypto
      4. App
      5. Security
      6. View All

      Google Classroom Turns Lessons into Podcasts with New Gemini Audio Feature

      January 7, 2026

      Speaking Instead of Typing: A Fresh Look at AI Dictation Apps in 2025

      December 30, 2025

      How Data Centers Became a Frontline Issue in 2025

      December 24, 2025

      Adobe Expands Firefly With Text-Based Video Editing and New AI Model Integrations

      December 16, 2025

      Hacktivist Erases Extremist Platforms in Real Time at Major Hacker Event

      January 5, 2026

      A Government Spyware Alert Hit Your Phone — What Should You Do Next?

      December 29, 2025

      The Cybersecurity Stories of 2025 That Left Us in Awe

      December 26, 2025

      Hackers Claim Pornhub Data Theft and Attempt Extortion After Analytics Breach

      December 16, 2025

      Robinhood Acquires Bitstamp for $200M to Bolster Crypto Presence

      July 18, 2024

      CoinDCX Expands Globally with Acquisition of BitOasis

      July 4, 2024

      IRS Finalizes New Regulations for Crypto Tax Reporting

      July 4, 2024

      EU Privacy Decision Looms for Worldcoin Amid Ongoing Controversy

      June 4, 2024

      Skylight Calendar 2 Brings Smarter Family Planning Into the Home

      January 8, 2026

      Inside the U.S. TikTok Agreement: What It Means and How We Got Here

      December 30, 2025

      Speaking Instead of Typing: A Fresh Look at AI Dictation Apps in 2025

      December 30, 2025

      Italy Steps In to Challenge Meta’s Restrictions on AI Chatbots in WhatsApp

      December 24, 2025

      Kaspersky to Cease US Operations and Lay Off Employees Following Government Ban

      July 17, 2024

      Data Breach Exposes Millions of mSpy Customers’ Data

      July 12, 2024

      HealthEquity Describes Data Breach as an ‘Isolated Incident’

      July 4, 2024

      Twilio Confirms Hackers Accessed Cell Phone Numbers of Authy Users

      July 4, 2024

      Skylight Calendar 2 Brings Smarter Family Planning Into the Home

      January 8, 2026

      Google Classroom Turns Lessons into Podcasts with New Gemini Audio Feature

      January 7, 2026

      Hacktivist Erases Extremist Platforms in Real Time at Major Hacker Event

      January 5, 2026

      Inside the U.S. TikTok Agreement: What It Means and How We Got Here

      December 30, 2025
    • Contact
    TechZappi
    Home»Technology»Cybersecurity»Safeguarding Your X Account: Expert Tips to Foil Hackers
    Cybersecurity

    Safeguarding Your X Account: Expert Tips to Foil Hackers

    January 30, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The recent security breach at the Securities and Exchange Commission (SEC) serves as a stark reminder of the constant threat posed by cybercriminals. In the wake of this incident, cybersecurity expert Rachel Tobac offers invaluable advice for X users seeking to fortify their accounts and ward off similar attacks.

    The SEC’s account fell victim to a breach on X, formerly known as Twitter, on Jan. 9, when hackers falsely claimed the approval of exchange-traded funds. While the SEC later confirmed the approval of 11 tradable spot bitcoin exchange-traded funds (ETFs), the repercussions were already felt, with Bitcoin prices plummeting by approximately 6% to nearly $44,000.

    “I would say I did see this coming,” remarked Tobac, a renowned “friendly hacker.” “Unfortunately, there’s a lot of reasons why these types of attacks happen…We see account takeovers happen all the time, especially in the crypto space on Twitter.”

    IT Brew caught up with Tobac, the co-founder and CEO of SocialProof Security in San Francisco, California, to delve into the hack and explore strategies for preventing account takeovers on X.

    1. Remove Phone Numbers from X and Other Valuable Accounts: Eliminating your phone number from X and other significant accounts can thwart SIM swapping, a technique used by malicious actors to hijack phone numbers. By contacting your telephone company and impersonating you, hackers can switch your number to their SIM card, gaining unauthorized access. “A lot of users don’t realize that when they went through the verification process, the phone number was then stored on their account,” Tobac explained. “Now Twitter has this kind of insecure way of allowing you to reset your password.”
    2. Enable Multi-Factor Authentication (MFA): While X’s policy shift on two-factor authentication (2FA) may have left text message-based 2FA users vulnerable, Tobac recommends activating app-based MFA instead. Despite the inconvenience, MFA provides an additional layer of security against SIM swapping and other forms of cyber attacks. Tobac advises users to extend MFA protection to third-party apps like Sprout Social and Hootsuite.
    3. Employ Strong, Unique Passwords: Tobac underscores the importance of using lengthy, random, and distinct passwords for X and associated accounts. Employing a password manager can facilitate the management of multiple complex passwords, reducing the risk of unauthorized access. “Using a long, random, and unique password will raise the bar for attackers and make it harder for them to get into your account,” Tobac emphasized.

    By implementing these proactive measures, X users can bolster the security of their accounts and mitigate the threat of cyber intrusions. Taking steps to safeguard personal data is paramount in today’s digital landscape, where the risk of cyber attacks looms large.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleNavigating Data Privacy: The Power of Doxing and Proactive Protection
    Next Article Heightened Concerns: 1 in 3 Americans Fearful of Smart Device Hacks
    admin
    • Website

    Related Posts

    Skylight Calendar 2 Brings Smarter Family Planning Into the Home

    January 8, 2026

    Google Classroom Turns Lessons into Podcasts with New Gemini Audio Feature

    January 7, 2026

    Hacktivist Erases Extremist Platforms in Real Time at Major Hacker Event

    January 5, 2026

    Inside the U.S. TikTok Agreement: What It Means and How We Got Here

    December 30, 2025
    Leave A Reply Cancel Reply

    Our Picks

    Remember! Bad Habits That Make a Big Impact on Your Lifestyle

    January 13, 2021

    The Right Morning Routine Can Keep You Energized & Happy

    January 13, 2021

    How to Make Perfume Last Longer Than Before

    January 13, 2021

    Stay off Social Media and Still Keep an Online Social Life

    January 13, 2021
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    App

    Skylight Calendar 2 Brings Smarter Family Planning Into the Home

    January 8, 2026

    Skylight’s journey began with a simple digital photo frame, but the company has steadily evolved…

    Google Classroom Turns Lessons into Podcasts with New Gemini Audio Feature

    January 7, 2026

    Hacktivist Erases Extremist Platforms in Real Time at Major Hacker Event

    January 5, 2026

    Inside the U.S. TikTok Agreement: What It Means and How We Got Here

    December 30, 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

      About Us
      About Us
      Our Picks

      Remember! Bad Habits That Make a Big Impact on Your Lifestyle

      January 13, 2021

      The Right Morning Routine Can Keep You Energized & Happy

      January 13, 2021

      How to Make Perfume Last Longer Than Before

      January 13, 2021
      New Comments
        Facebook X (Twitter) Instagram Pinterest
        • Home
        • Politics
        • Business
        • Technology
        © 2026 TechZappi. All Rights Reserved.

        Type above and press Enter to search. Press Esc to cancel.

        Sign In or Register

        Welcome Back!

        Login to your account below.

        Lost password?