Feeds

Twitter settles with FTC over celeb account hacks

Obama and Spears account hijinks fail to amuse privacy watchdog

Protecting against web application threats using SSL

Twitter has settled with the US Federal Trade Commission (FTC) over a complaint that it had failed to safeguard user privacy well enough, a shortcoming that allowed two successful attacks against the micro-blogging network in 2009.

The settlement means that Twitter will be obliged to establish a more rigorous information security policy – which will be independently audited, at Twitter's expense, every two years. The micro-blogging site also agreed not to make assurances that mislead consumers about the "extent to which it protects the security, privacy, and confidentiality" of private information.

Breaches to the agreement, finalised last Friday, will cost Twitter up to $16,000 a pop.

The agreement draws a line under a complaint from the FTC over a brace of breaches between January and May 2009 that allowed hackers to gain administrative control of Twitter. Hackers were able to send out Tweets under assumed names as well as snoop upon the privacy settings of prominent users.

Hackers were able to take over prominent Twitter accounts – including those maintained by Barack Obama and Britney Spears – and make merry as a result of security shortcomings by Twitter back in January 2009. A simple password guessing attack was used to break into Twitter feeds, before falsely outing Fox News pundit Bill O'Reilly as gay and eliciting the strange admission from Spears that her vagina was four feet wide "with razor sharp teeth".

A second, separate hack in late April allowed hackers to spy on the account settings of the most exclusive Twitterati. The breach allowed miscreants to discover that both Ashton Kutcher and pop star Lily Rose Allen had blocked celebrity gossip monger Perez Hilton, for example. Barack Obama had blocked 96 Twitter users at the time, according to screenshots of the hack posted on a French blog. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.