US authorities take Twitter to task over security
The US Federal Trade Commission (FTC) has criticised Twitter's lax internal security procedures, which enabled hackers to post fake statements from the accounts of US President Barack Obama and others.

The US Federal Trade Commission (FTC) has criticised Twitter's lax internal security procedures, which enabled hackers to post fake statements from the accounts of US President Barack Obama and others.



From forensic cyber to encryption: InfoSec17
Security technologist Bruce Schneier’s insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken’s comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
The FTC found that Twitter did not restrict administrative access to certain computers, prohibit simple passwords for administrators, or require regular password changes, according to a report in the Financial Times.
In January 2009 a hacker used an automated password-guessing tool to crack the management account of a Twitter employee, the FTC revealed.
The hacker used that access to reset passwords on regular accounts, including Obama's, and posted the new passwords on the web.
Other people then used those passwords to send phoney messages from Obama's account and those of eight other people.
Read more on IT risk management
-
Why businesses must think like criminals to protect their data
-
Security Think Tank: Use awareness, education and controls to halt cryptojacking
-
Security Think Tank: Awareness is a good starting point to counter fileless malware
-
Security Think Tank: Human, procedural and technical response to fileless malware
Start the conversation
0 comments