Feeds

Oi, journos. Try NOT to get hacked again. Lots of love, Twitter

Hackers have painted a bullseye on hacks' heads, chat site warns

The Power of One eBook: Top reasons to choose HP BladeSystem

Twitter has warned news agencies that hackers could strike again unless journalists take basic precautions - like using a decent password.

The micro-blogging site wrote to a number of news outlets warning that hackers consider them "high value" targets.

Their note of caution comes as the Syrian Electronic Army continued their online assault by hacking into Twitter accounts owned by the Guardian.

The infiltration follows the dramatic hacking of the Associated Press' Twitter account by the same group, which the hackers used to send a fake tweet claiming President Obama was injured in a bomb attack. Traders on the Dow Jones stock market panicked, apparently as a result of the tweet, and sent the index plummeting by 143 points.

Twitter's letter to news organisations said:

Please help us keep your accounts secure. There have been several recent incidents of high-profile news and media Twitter handles being compromised. We believe that these attacks will continue, and that news and media organizations will continue to be high value targets to hackers.

The briefing note claimed the hacking incidents were spear phishing attacks, which target corporate email.

Twitter's security bods suggested setting passwords and never sending them by email. One hard to remember password Twitter could be a nonsense word like "LauH6maicaza1Neez3zi" or a random string of words like "hewn cloths titles yachts refine". According to Twitter, "Very difficult passwords will discourage memorization, which will greatly reduce the chances of being phished".

Journalists should designate one computer for Twitter use to avoid spreading the password around, according to the letter. This computer should NOT be used to surf the web or do anything but tweet, which definitely overestimates the IT resources available to most news outlets in the digital age.

The number of people given access to key Twitter accounts should be kept to a minimum, Twitter advises.

The email continued: "Strong security practices will reduce your vulnerability to phishing."

There's no word on whether these security suggestions might limit journos' ability to actually use their computers or send tweets - two things Twitter might like to encourage. ®

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.