• About
  • Advertise
  • Careers
  • Contact
Monday, March 20, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Cyber Crime

Bella Throne will not be bullied by cybercriminals.

by Cyber360 News
November 11, 2019
in Cyber Crime
0
Bella Throne will not be bullied by cybercriminals.
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter

Bella Throne will not be bullied by cybercriminals.

Stealing private photographs of celebrities and threatening to post them online unless they give in to the demands of the hacker has become a common norm among cybercriminals for making quick bucks. But, not all the celebs could be intimidated and Bella Thorne is one of them.

Reportedly, topless pictures of singer and actress Bella Thorne were stolen by a hacker after hacking her Twitter account on Friday. The hacker also posted several tweets from Thorne’s Twitter handle, some of which contained racist comments while Thorne’s profile picture was also replaced with a man’s picture. The hacker then contacted her and threatened to release the pictures online.

See: Sauna security camera hacked; nude videos of Dutch Women’s handball team leaked

Bella Thorn decided to teach the hacker a lesson and posted the images herself on her Twitter account with a message for the hacker, which read:

“For the last 24 hours, I have been threatened with my own nudes. I feel gross. I feel watched, I feel someone has taken something from me that I only wanted one special person to see.”

“I can sleep tonight better knowing I took my power back. U can’t control my life u never will.”

Bella Thorn also posted screenshots of the text messages exchanged between her and the hacker. She noted that she isn’t as helpless as the hacker thinks.

The hacker’s tweets were later deleted by the 21-year old actress and the man’s picture on the profile was also changed. Bella Thorn claims that the hacker possesses nude pictures of many other celebs. While speaking with The Hollywood Reporter, she stated that the hacker is most probably a juvenile and perhaps has no idea of the consequences of his actions.

“This kid sounds like he’s 17, as much as I’m so angry and wanted to fuck him up over doing this to people I just wanted to teach him a lesson. He’s still a kid and we make mistakes, this mistake is a bad one. But I don’t want some 17-year-old’s whole life ruined because he wasn’t thinking straight and [was] being a dumbass,” said Thorne.

Fuck u and the power u think you have over me. I’m gonna write about this in my next book??? pic.twitter.com/0Ep0iXgW51

— BITCHIMBELLATHORNE (@bellathorne) June 15, 2019

She further added that the hacker is quite skilled and he can easily use his knowledge for helping out the community, which sadly he isn’t currently doing.

“…If he got on the right side of the tracks he could actually possibly help our community and be an alliance. You can’t always tear someone down for their bad sides but more so build up their good sides,” stated Thorne.

Bella Thorne’s Twitter handle has over 6.6 million followers, so, it is indeed a gutsy decision to post her nudes online. With this incident, Bella Thorne has joined the list of celebrities like Jennifer Lawrence, Kate Upton, and Aubrey Plaza who had faced a similar situation some time back.

See: Teen girl facing up to 10 years for sending nude selfie

This is not the first time when a celebrity has decided not to be bullied by cybercriminals. Last week, the popular British band Radiohead said that it is releasing unheard recordings of its Ok Computer album after it suffered a cyber attack in which an unknown hacker demanded $150,000 in exchange for the material and threatened the band members to release their yet unheard recordings to the public.

However, the band members decided to release the recordings themselves on Bandcamp instead of giving into the hacker’s demand of paying the ransom.

Did you enjoy reading this article? Like our page on Facebook and follow us on Twitter.

Cyber360 News

Cyber360 News

Next Post
The Cobalt Strike advanced persistent threat (APT) group is using Google App Engine to spread PDF malware against financial firms.

The Cobalt Strike advanced persistent threat (APT) group is using Google App Engine to spread PDF malware against financial firms.

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In