Twitter Tries to Sooth Public Concerns of Safety with DMARC

By

Earlier this month Twitter reported a scam that affected 250,000 users, where usernames, e-mail addresses, session tokens and encrypted/salted versions of their passwords were stolen, which left users a tad uneasy, but was still forgiven by the public. 

However, as we uncovered in the beginning of this week, there was a strange hack of Burger Kings’ and Jeeps’ Twitter account over the weekend that left most users with the irrefutable impression that Twitter is lacking in its security measures.

To appease to the public’s overwhelming concern, Twitter has revealed its new technology, DMARC, a new security protocol created to help reduce the potential for e-mail-based abused.  According to Twitter, DMARC will solve the issues surrounding long-standing operations, deployment and reporting issues related to e-mail authentication protocols by giving E-mail providers a way to block E-mails from forged domains popping up in inboxes.

In a statement, Twitter revealed, “While this protocol is young, it has already gained significant traction in the email community with all four major email providers – AOL, Gmail, Hotmail/Outlook, and Yahoo! Mail – already on board, rejecting forged e-mails. We hope to see it gain more coverage for our users as even more E-mail providers adopt it, and that it gives you more peace of mind when you get an e-mail from us.”

Although Twitter has addressed an ongoing issue with its e-mail, it has yet to offer any innovational precautionary software for its account security. The only reassurance Twitter had to offer was to remind its users to create strong passwords and make sure that browsers and operating systems are updated with the most current versions and patches.

These are the same precautionary steps that every mobile platform advises users to take, with the hope that their chances of being hacked will substantially decrease. But as mobility usage will continue to increase, as has done so around the world, therefore creating the higher chances for a hacker to enter its gateway.

Large corporations like PayPal have begun introducing programs like Fast Identity Online (FIDO) into its operating systems, as a main part of its function deals with sensitive information, like users financial accounts. This gives mobile devices a more central role in the authentication process and uses cryptographic methods to pass information to back-end servers so log-in data is not sent over the wire or stored on the back-end, where it can be stolen.

Although Twitter does not deal with the same personal information as PayPal, as we have seen with Burger King and Jeep, if accounts are hacked companies are put at the same financial risks from is they are publicly defamed.  

Without the proper set of updated laws in the industry, designed to punish data brokers and hackers in the same way that criminals are punished for robbing a bank, these types of scams will continue. Even though Twitter has put forth a new technology to protect its E-mail system, there are still many areas of security that must be covered.

To stay updated with the latest news from Twitter, click here.




Edited by Amanda Ciccatelli
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Web Editor

SHARE THIS ARTICLE
Related Articles

Shabodi Accelerates Adoption of Network-Aware Applications with CAMARA API Enterprise Reference Implementation

By: Special Guest    2/16/2024

Shabodi, an Application Enablement Platform (AEP) provider unleashing advanced network capabilities in LTE, 5G, 6G, and Wi-Fi 6, announced they have l…

Read More

How Much Does Endpoint Protection Cost? Comparing 3 Popular Solutions

By: Contributing Writer    2/2/2024

Endpoint protection, also known as endpoint security, is a cybersecurity approach focused on defending computers, mobile devices, servers, and other e…

Read More

What Is Databricks? Simplifying Your Data Transformation

By: Contributing Writer    2/2/2024

Databricks is an innovative data analytics platform designed to simplify the process of building big data and artificial intelligence (AI) solutions. …

Read More

What Is Blue/Green deployment?

By: Contributing Writer    1/17/2024

Blue/green deployment is a software release management strategy that aims to reduce downtime and risk by running two identical production environments…

Read More

The Threat of Lateral Movement and 5 Ways to Prevent It

By: Contributing Writer    1/17/2024

Lateral movement is a term used in cybersecurity to describe the techniques that cyber attackers use to progressively move through a network in search…

Read More