Feeds

Ex-Doctor Who babe Karen Gillan touts dodgy diet pills in twit gaffe

Amy Pond actress tackles new kind of monster - hackers

High performance access to file storage

The Twitter account of former Doctor Who actress Karen Gillan was compromised to tout dodgy weight-loss pills to baffled fans.

A series of links posted by @KarenGillan2 suggested the Scottish star, who played the time lord's companion Amy Pond, had found a means to rapidly shed pounds without the need for some Adipose treatment.

Karen Gillan. Pic: BBC

Amy Pond Karen Gillan (Credit: BBC)

Clicking on the URLs in the former model's updates took her followers to a made-up news story promoting the supposed benefits of an acai berry* diet.

Almost a quarter of a million people follow the popular actress, who recently left the hit family show. The dodgy diet tips were swiftly deleted but can be seen here.

It's unclear how Gillan's Twitter account was hacked. Phishing or malware attacks, or simply guessing a weak password, are all possible means of compromising the account. Alternatively, she may have clicked on a link or granted permission to a dodgy app that made the updates to her profile. A website used by Gillan may have been compromised and revealed a password that was also used for her Twitter login, possibly.

Recent updates to Gillan's Twitter account suggest she's regained control of her tweets after changing her password. "Hey everyone! Please ignore latest tweets! I got hacked!" she wrote yesterday.

And the actress who replaced Gillan as Doctor Who's principal sidekick also ran into trouble on Twitter: Jenna-Louise Coleman, the former Emmerdale soap star who now plays Clara Oswald in the long-running BBC sci-fi series, was the target of a sex video scam.

Twits were sent messages to trick them into visiting a bogus celebrity smut website that claimed to feature the actress. Anyone who clicked on the site's thumbnails to see more ended up following a Twitter account and posting an update further promoting the scam on their own feeds, as explained by net security firm Sophos.

None of Coleman's online accounts were actually compromised, unlike Gillan's Twitter account. Celebrity Twitter profile hijacks are all too common: previous victims have included Britney Spears (a serial victim) and President Barack Obama, among many others. ®

Foodnote

* Pills derived from acai berries supposedly cause weight loss without dieting or exercise. Acai berries do contain antioxidants and are generally regarded as a healthy snack - but actual experts (here and here) dismiss the flab-fighting claims as cobblers.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.