The Syrian Electronic Army hacked all of Skype's social media accounts and accused Microsoft of helping the government spy and monitor our email. It’s said there is no rest for the wicked, and New Year’s Day had Skype social media managers scrambling to scrub evidence of being hacked off of its Skype blog, Twitter and Facebook accounts. That evidence was planted by the Syrian Electronic Army and accused Microsoft of spying for the “governments.”After the SEA’s attack, Skype sent out a pair of tweets to its 3 million Twitter followers, warning:Those Skype tweets were deleted and then replaced with this tweet: “You may have noticed our social media properties were targeted today. No user info was compromised. We’re sorry for the inconvenience.”The SEA also hacked the Skype blog: These posts were mirrored on Skype’s Facebook page before quickly being deleted.Then reporter Matthew Keys tweeted this screenshot “proof” of the Skype hack sent to him by the SEA. The SEA also tweeted Steve Ballmer’s contact information along with the message, “You can thank Microsoft for monitoring your accounts/emails using this details. #SEA”Although the SEA has successfully hacked many major companies, the Skype hack seems to be referring to Microsoft’s alleged cooperation with the NSA. Microsoft denied providing backdoor real-time access, but revelations provided by Edward Snowden indicated that the NSA can successfully eavesdrop on Skype video calls. Although Microsoft vowed to protect users from NSA surveillance, the Redmond giant “forgot” to mention Skype in its promises.As security expert Graham Cluley pointed out, “Chances are that Skype didn’t read my New Year’s resolution advice about not using the same passwords for multiple accounts.”In fact, Skype seems to have disregarded its parent company’s advice. Microsoft’s Security TechCenter has a post regarding “selecting secure passwords.” Regarding “Password Age and Reuse,” it states:Users should also change their passwords frequently. Even though long and strong passwords are much more difficult to break than short and simple ones, they can still be cracked. An attacker who has enough time and computing power at his disposal can eventually break any password. In general, passwords should be changed within 42 days, and old passwords should never be reused.Skype itself has a few password “rules” such as:A password must:Be at least 6 characters and not longer than 20 characters.Contain at least one letter and one number.Not have any spaces.Not contain your Skype Name (case insensitive).Not be a part of Skype Name (case insensitive).Your password also cannot contain any of the following words:1234, 4321, qwert, test, skype, myspace, password, abc123, 123abc, abcdef, iloveyou, letmein, ebay, paypal.However, after the Skype hack gave Microsoft a black eye with spying accusations, it’s a pretty safe bet that whoever controls Skype social media will no longer resuse the same password to protect all of the company’s accounts. And if you reuse the same password on different sites, it would be a great 2014 resolution to change all your passwords, keep them in a password safe, and make sure you don’t use the same one for multiple sites. Like this? Here’s more posts:Lulzy Christmas: Hackers buy presents for the poor with gov’t officials’ credit cardsHow Microsoft invented, or invisibly runs, almost everythingHow to customize Windows 8.1 Start screen and keyboard shortcut tricksDrivers beware: Roadblocks where cops collect ‘voluntary’ blood and saliva samplesMicrosoft fails to mention Skype in promises to protect users from NSA surveillance300-pound crime-predicting mobile robot: Crime-preventing precog or ‘R2D2’s evil twin’?Porn-surfing corporate bosses infect networks, then keep data breaches a secretHow to change Windows 8.1 to local account with no Microsoft email account requiredStressed out? Virtual nature via Microsoft’s new 3D Photosynth will soothe youPresident’s Review Group recommends reforming the NSA so we have security AND privacyPrivacy plays an important part in cloud predictions for 2014Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe