recommended reading

Good Timing: Twitter Will Soon Release a Two-Step Security Solution

Flickr user thecampbells

Some Twitter employee — probably several employees, actually — had a pretty rough day on Tuesday, after a hack led to the AP sending a fake tweet to its 2 million followers. If only the hacker had waited, Twitter could've stopped them! Minutes before appearing on the Rachel Maddow Show to talk about the hack Wired's Mat Honan reported, "Twitter has a working two-step security solution undergoing internal testing before incrementally rolling it out to users, something it hopes to begin doing shortly." It is not quite the edit button Honan had asked for in a piece published not long after the AP incident, but it's a big step forward for Twitter security. (Plus, as The Atlantic Wire's Rebecca Greenfield reports, an edit button would never work.)

Twitter security breaches, we've all learned, can be problematic. The AP hack on Tuesday reported to the world that the White House had been bombed and President Obama injured. It only took a few seconds to discredit the report, but that time frame was long enough to send the Dow plummeting. And then of course, seemingly everybody with access to the Internet had to write a blog post about how dangerous Twitter's its shaky security is. 

This is not a new problem. Nearly two years ago, we pointed out how Twitter was content to remain hands off in hacking incidents, even those at news organizations that stand tos end fear into the hearts of millions of followers. After hacked NBC News account with hundreds of thousands of followers reported a terrorist attack in downtown Manhattan, Twitter declined to comment on the situation and directed disgruntled users to an FAQ about keeping your account safe. However, it now seems apparent that Twitter's own tools aren't enough to keep accounts safe, so Twitter's finally doing something.

Of course, it'll be a little while before the feature rolls out to regular users. In the meantime, you have to applaud both Honan and Twitter for the timing of the update. Even though it's journalism and the two-step verification has been in the works for a long time, it feels like good customer service to hear that Twitter's taking action so soon after the AP boondoggle.

(Image via Flickr user thecampbells)

Threatwatch Alert

User accounts compromised

1 Million Online Gaming Accounts Exposed

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.