Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Fox hackers exploit slow Twitter response

July 06 2011

The recent hijacking and misuse of a Fox News Twitter account by unknown attackers highlights some of the risks enterprises face when using social networking and related services.

Over a period of five and a half hours on Monday morning someone using a hijacked Fox News Twitter account posted a series of false tweets grimly proclaiming that President barack Obama had been the assassinated.

The incident is currently under investigation by the U.S. Secret Service.

According to a source close to the matter, the network informed Twitter that its account had been hijacked as soon as false tweets were discovered on Monday morning.

Administrators could not get into the account because the password had been changed and the hackers disabled the "change password" function. The sources said that Fox personnel could only wait and watch hackers use the account in the five and a half hours it took for Twitter to respond.

At that point, Twitter suspended the account and returned control to Fox personnel, who immediately deleted tweets posted by the hijackers.

"The network was not in control of the account once it was hacked and Twitter was unreachable until late morning eastern time yesterday," said Jeff Misenti, vice president and general manager of Fox News Digital, in a statement on Monday. "The tweets were taken down as soon as Twitter gave back control of the account to the network."

Misenti said he has asked Twitter to investigate how the incident occurred and to come up with a plan to prevent similar unauthorized access.

Twitter did not respond to a request for comment on the incident.

The Fox incident is just the latest Twitter account to be hijacked by hackers. Earlier this week, in fact, a U.K Twitter account of PayPal was taken over and was used to send angry tweets against the service.

In the PayPal case , it took more than two hours for the tweets to be removed. It's not immediately clear whether PayPal was slow in notifying Twitter or the latter's response was slow.

PayPal officials could not be reached for comment on the incident.

The Fox and PayPal incidents are but two examples of the risks that the use of social services like Twitter can pose to companies, said Rich Mogull an analyst at Securosis.

"If you are large enough, talk to your provider ahead of time to understand how to report a problem, and who to report it to," Mogull suggested.

"Make contact, get a name, and establish a validation process to prove you are the owner of the account in an incident," he added. "The last thing you want to be doing is hanging around for a help desk person to see your request in the queue."

Companies using social media for business purposes also need to restrict access to the accounts, he said.

Chester Wisniewski, a senior security advisor at Sophos, said accounts are more easily hijacked when companies have weak password policies.

Though it's not yet clear what happened in the case of Fox News, Twitter hackers generally take advantage of easy-to-guess passwords, reused passwords or passwords that are shared among many people, he said.

Wisniewski also stressed that social networks like Twitter have an obligation to help ensure its accounts are secure. Even though the service is free and Twitter makes no guarantees about security, it should offer verified Twitter account holders some way to quickly address security problems, he said.

Twitter needs to consider offering some sort of back-channel mechanism for verified account holders to report problems.

The micro blogging service might also want to consider offering verified account holders such as Fox News a way to lock the email address associated with their Twitter account so as to prevent unauthorized users from changing it, he said.

Sours From

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/