SHARE
After a series of attack on Twitter Accounts, they launched their new verification service “Login Verification” , this step was taken by twitter too late because many of the high profile twitter accounts hijacked by hackers like AP, ONION, E-Online, BBC, Guardian, Financial Times and the latest one is The Telegraph.





 

They all accounts were hijacked by pro-assad hackers group Syrian Electronic Army and in the starting of this month twitter also gave 3 steps advice to news organizations that how they can secure their account but those 3 steps didn’t work. 

Attacks were not limited to media outlets, with two of FIFA’s Twitter accounts having been hacked in April, for which the Syrian Electronic Army also claimed responsibility. 

 
Security experts also welcomed twitter for this step to tighten their security and in the past few years attacks on social media really increases, Sophos security threat report 2013 also explained how attackers hijacking social media accounts. 

 “It’s been a long time coming,” said Jeremiah Grossman, chief technology officer of White Hat Security. “It’s not going to solve all problems, but it’s a step in the right direction.” 

About Twitter “Login Verification”: 

This is a form of two-factor authentication. When you sign in to twitter.com, there’s a second check to make sure it’s really you. You’ll be asked to register a verified phone number and a confirmed email address

To access the service through applications for PCs and smartphones, users must use an automatically generated temporary password for each of the programs. 

Twitter also explained in their blog how you can enroll Login Verification. 

 “This would have made the AP hack and other hacks against Twitter more difficult to accomplish,” said Jeffrey Carr, CEO of cyber security firm Taia Global Inc. 

 
Yet he added that hackers looking to break into corporate accounts will still be able to do so if they can take control of PCs or smartphones running applications authorized to use the service. 

 
“Two-factor authentication isn’t perfect,” Carr said. “If you own the machine, it really doesn’t matter.” 

 
>>Catch all these Latest Updated More Easily<< 

Subscribe to our Newspaper 

Follow us on FacebookTwitter and Google+

NO COMMENTS

LEAVE A REPLY

This site uses Akismet to reduce spam. Learn how your comment data is processed.