recommended reading

Good Timing: Twitter Will Soon Release a Two-Step Security Solution

Flickr user thecampbells

Some Twitter employee — probably several employees, actually — had a pretty rough day on Tuesday, after a hack led to the AP sending a fake tweet to its 2 million followers. If only the hacker had waited, Twitter could've stopped them! Minutes before appearing on the Rachel Maddow Show to talk about the hack Wired's Mat Honan reported, "Twitter has a working two-step security solution undergoing internal testing before incrementally rolling it out to users, something it hopes to begin doing shortly." It is not quite the edit button Honan had asked for in a piece published not long after the AP incident, but it's a big step forward for Twitter security. (Plus, as The Atlantic Wire's Rebecca Greenfield reports, an edit button would never work.)

Twitter security breaches, we've all learned, can be problematic. The AP hack on Tuesday reported to the world that the White House had been bombed and President Obama injured. It only took a few seconds to discredit the report, but that time frame was long enough to send the Dow plummeting. And then of course, seemingly everybody with access to the Internet had to write a blog post about how dangerous Twitter's its shaky security is. 

This is not a new problem. Nearly two years ago, we pointed out how Twitter was content to remain hands off in hacking incidents, even those at news organizations that stand tos end fear into the hearts of millions of followers. After hacked NBC News account with hundreds of thousands of followers reported a terrorist attack in downtown Manhattan, Twitter declined to comment on the situation and directed disgruntled users to an FAQ about keeping your account safe. However, it now seems apparent that Twitter's own tools aren't enough to keep accounts safe, so Twitter's finally doing something.

Of course, it'll be a little while before the feature rolls out to regular users. In the meantime, you have to applaud both Honan and Twitter for the timing of the update. Even though it's journalism and the two-step verification has been in the works for a long time, it feels like good customer service to hear that Twitter's taking action so soon after the AP boondoggle.

(Image via Flickr user thecampbells)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.