Feeds

WTF: Twitter bug temporarily kills THAT Oscar selfie

Loadsa tweets caught in Senseless Uncoupling drama

Reducing the cost and complexity of web vulnerability management

Twitter was awash with complaints late yesterday as celeb stalkers noticed they could no longer access a number of famous tweets - including that Oscar selfie.

The micro-blogging site said it was working on a fix about 12 hours ago and it has yet to provide an update, but the missing tweets appear to be slowly returning to Twitter.

Those clicking on the affected tweets were greeted with the unwelcome message "Sorry that page doesn't exist".

The sudden disappearance of the tweets led to some panicky fans moaning to Twitter saying shouty things like "Get it fixed NOW!!!" and "PLEASE IM LITERALLY GONNA CRY PLEASE SORT IT OUT."

The Register has asked Twitter if all is well with its glitchy system now. But it hadn't got back to us at time of writing.

Meanwhile, its Twitter Support account is still carrying what appears to be a stale statement about the missing tweets bug.

®

Choosing a cloud hosting partner with confidence

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.