Hackers vs. Twitter and strong security for cloud computing

According to Biz Stone, “about a month ago, an administrative employee at Twitter was targeted and her personal email account was hacked. The hacker used information in the e-mail account to access this employee’s Google Apps account, which contained a wide variety of Twitter documents from ideas to financial details.” “This attack had nothing to do with […]

According to Biz Stone, “about a month ago, an administrative employee at Twitter was targeted and her personal email account was hacked. The hacker used information in the e-mail account to access this employee’s Google Apps account, which contained a wide variety of Twitter documents from ideas to financial details.” “This attack had nothing to do with any vulnerability in Google Apps which we continue to use,” he wrote, the incident underscored the need for choosing strong passwords. Since then, we have performed a security audit and reminded everyone of the importance of personal security guidelines,”said stone. TechCrunch reports, that they’ve received 310 confidential Twitter documents in a zip file from the hacker called “Hacker Croll”. “The best passwords have more than 8 or 9 characters and are comprised of alphanumeric characters, a combination of letters and numbers,. But this is a people issue in that employees often don’t practice good password safety and may use the same password for many different applications,” said John Pirc of IBM. The post goes on to tackle the issues of security in the cloud and the heightened potential for intrusion.

Source:→ BusinessWeek