Kristine Schachinger shows us how someone can intercept a Twitter direct message. In fact, it's a lot easier than "taking candy from a baby," she explains. When someone agrees to allow access to log
in, they also agree to let the developer who created the log-in access to your direct messages. She points to an article by Gary Adam Shannon that explains how it works.
Read the whole story at Search Engine Watch »