Hackers redirected Twitter.com's traffic to a rogue website for more than an hour last week by accessing its DNS records using an account assigned to Twitter, according to the company that manages Twitter's DNS servers said today.
Twitter initially blamed the hour-long blackout of its site on changes made to the company's DNS records, which act like a telephone directory to match the twitter.com domain name with the IP addresses used by its servers.

"Twitter's DNS records were temporarily compromised, but have now been fixed," the company said on its service status page at 2:30 a.m. ET last Friday. "We are looking into the underlying cause and will update with more information soon." The status page has not been revised with more information since then.

Twitter uses a New Hampshire firm, Dyn Inc., to manage its DNS records, which match Twitter's domain name (twitter.com, and numerous others) with the IP addresses of its servers.

The link for this article located at Tech World is no longer available.