Al-Khateeb: Saudi Arabia has become a global hub for innovations with SR800 billion investments    Nadhmi Al-Nasr: 140,000 workers involved in NEOM projects around the clock    GREAT FUTURES: Saudi Arabia and UK strengthen economic ties    ZATCA sets SR3000 maximum duty-free purchase limit for incoming passenger    Almost 450,000 people have fled Rafah in a week, UN says    Eurovision responds to complaints of bad behavior    Ex-lawyer Michael Cohen says he paid hush money at Trump's direction    Injured Palestinian mothers grieve for babies killed in Gaza    Glioblastoma: Top Australian doctor remains brain cancer-free after a year    Islamic minister launches design models for mosques simulating identity of various Saudi regions    Makkah deputy emir: No Hajj without a permit, and violators will be dealt with sternly    Saudi Minister of transport and logistics begins official visit to Finland    Saudi dates exports jump by 13.7% in Q1 of 2024    Introducing Zilos: A luxury Culinary Oasis of Mediterranean and Asian Fusion in Jeddah    Neymar celebrates Al Hilal's title win, eager for comeback next season    Al Hilal wraps up Saudi League title; Jesus touts season as model of excellence    Al Hilal clinches Saudi Professional League title in a star-studded season    Saudi authorities recall contaminated mayonnaise after food poisoning incident at Riyadh restaurant    Al Ettifaq inflicts historic 5-0 defeat on Al Ittihad in Saudi Professional League    Israel heads to Eurovision final, despite protests    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    We have celebrated Founding Day for three years - but it has been with us for 300    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Twitter's security breached again, raises questions on password security
By Jordan Robertson
Published in The Saudi Gazette on 17 - 07 - 2009

mail can be child's play for a determined hacker, as Twitter Inc. employees have learned the hard way - again.
For the third time this year, the San Francisco-based company was the victim of a security breach stemming from a simple end-run around its defenses. In the latest case, a hacker got the password for an employee's personal e-mail account - possibly by guessing, or by correctly answering a security question - and worked from there to steal confidential company documents.
The techniques used by the attackers highlight the dangers of a broader trend promoted by Google Inc. and others toward storing more data online, instead of on computers under your control.
Password-protected sites are growing more vulnerable because to keep up with the growing number of passwords, people use the same simple ones on numerous sites across the Web. In a study last year, Sophos, a security firm, found that 40 percent of Internet users use the same password for every Web site they access.
The shift toward doing more over the Web - a practice known as “cloud computing” - means that mistakes employees make in their private lives can do serious damage to their employers, because a single e-mail account can tie the two worlds together.
Stealing the password for someone's Gmail account, for example, not only gives the hacker access to that person's personal e-mail, but also to any other Google applications they might use for work, like those used to create spreadsheets or presentations.
That's apparently what happened to Twitter, which shares confidential data within the company through the Google Apps package that incorporates e-mail, word processing, spreadsheet, calendar and other Google services for $50 per user per year.
Co-founder Biz Stone wrote in a blog posting Wednesday that the personal e-mail of an unnamed Twitter administrative employee was hacked about a month ago, and through that the attacker got access to the employee's Google Apps account.
Separately, the wife of co-founder Evan Williams also had her personal e-mail hacked around the same time, Stone wrote. Through that, the attacker got access to Williams' personal Amazon and PayPal accounts.
Stone said the attacks are “about Twitter being in enough of a spotlight that folks who work here can become targets.” Some of the material the hacker posted online from the Google Apps documents was more embarrassing than damaging, like floor plans for new office space and a pitch for a TV show about the increasingly popular online messaging service.
The hacker claims to have employee salaries and credit card numbers, resumes from job applicants, internal meeting reports and growth projections.
TechCrunch, a widely read technology blog, says it was e-mailed the documents, and subsequently published some of them, including financial projections that Twitter drew up in February. The forecast envisioned Twitter generating its first revenue in the current quarter, with sales of about $400,000 and about 60 employees. By the end of next year, Twitter expected to employ about 345 people with annual revenue of about $140 million, according to the documents published by TechCrunch.
Stone said in an e-mail that most of the documents TechCrunch has access to are “speculative exercises.” In his blog post, Stone said the stolen documents “are not polished or ready for prime time and they're certainly not revealing some big, secret plan for taking over the world,” but said they are sensitive enough that their public release could jeopardize relationships with Twitter's partners.
Stone said the company is talking to lawyers about “what this theft means for Twitter, the hacker, and anyone who accepts and subsequently shares or publishes these stolen documents.” What the attacks on Twitter show is that Web sites don't need to get compromised in the traditional sense to put its users and employees at risk.
How hackers work
Hackers don't need to find a vulnerability in the site itself, or plant a virus on an employee's computer, to sneak inside.
All they need to find is an employee who uses weak passwords for his or her e-mail accounts, or has security questions that are easy to answer with a little information about the person.
It can be trivial to guess someone's passwords, as former vice presidential candidate Sarah Palin found out during the election, when her personal e-mail was hacked and screenshots were posted online. The attacker sneaked in by accurately guessing the answer's to Palin's security questions, based on information about her and her family that was already online.
Password-guessing programs are also a common hacking tool. An attacker runs the program against an account, and if it's allowed to try lots of times and the password isn't very complicated, the hacker's in. The attacks on Twitter serve as a reminder of why many corporations are reluctant to jump on the cloud computing bandwagon.
Outsourcing sensitive jobs can save money but also open up companies to more risk, because their data aren't entirely under their control. Another trend online is for Web-based services to streamline access by letting users log into each others' sites with the same usernames and passwords. Facebook and other services have begun to do this, raising possible security risks.
Security experts advise people to use unique, complex passwords for each Web service they use and include a mix of numbers and letters. Free password management programs like KeePass and 1Password can help people juggle passwords for numerous sites.
Andrew Storms, director of security operations for nCircle, a network security company, suggested choosing false answers to the security questions like “What was your first phone number?” or making up obscure questions instead of using the default questions that sites provide. (Of course, that presents a new problem of remembering the false information.)
For businesses, Google allows company administrators to set up rules for password strength and add additional authentication tools like unique codes.
The lesson from Twitter's latest security troubles is an old one: Use strong passwords, which include some combination of letters and numbers, and for companies, be careful about how many accounts are linked to the same username and password combination.


Clic here to read the story from its source.