Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    VOTE: Best Grunge Godfather – Nirvana vs. Pearl Jam

    May 12, 2026

    Trump piles on the charm offensive ahead of meeting with China’s Xi—Musk and Cook invited

    May 12, 2026

    Trump Falls Asleep Multiple Times During Women’s Health Event In Oval Office

    May 12, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Here’s How Bad a Twitter Mega-Breach Would Be
    Technology

    Here’s How Bad a Twitter Mega-Breach Would Be

    By AdminNovember 18, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Here’s How Bad a Twitter Mega-Breach Would Be


    “Twitter has seemingly neglected security for a very long time, and with all the changes, there is risk for sure,” says David Kennedy, CEO of the incident response firm TrustedSec, who formerly worked at the NSA and with the United States Marine Corps signal intelligence unit. “There’s a lot of work to be done to stabilize and secure the platform, and there is definitely an elevated risk from a malicious insider perspective due to all the changes occurring. As time passes, the probability of an incident lowers, but the security risks and technology debt are still there.”

    A breach of Twitter could expose the company or users in myriad ways. Of particular concern would be an incident that endangers users who are activists, dissidents, or journalists under a repressive regime. With more than 230 million users, a Twitter breach would also have far-reaching potential consequences for identity theft, harassment, and other harm to users around the world. And from a government intelligence perspective, the data has already proved valuable enough over the years to motivate government spies to infiltrate the company, a threat the whistleblower Zatko said Twitter was not prepared to counter.

    The company was already under scrutiny from the US Federal Trade Commission for past practices, and on Thursday, seven Democratic senators called on the FTC to investigate whether “reported changes to internal reviews and data security practices” at Twitter violated the terms of a 2011 settlement between Twitter and the FTC over past data mishandling. 

    Were a breach to happen, the details would, of course, dictate the consequences for users, Twitter, and Musk. But the outspoken billionaire may want to note that, at the end of October, the FTC issued an order against the online delivery service Drizly along with personal sanctions against its CEO, James Cory Rellas, after the company exposed the data of roughly 2.5 million users. The order requires the company to have stricter policies on deleting information and to minimize data collection and retention, while also requiring the same from Cory Rellas at any future companies he works for.

    Speaking broadly about the current digital security threat landscape at the Aspen Cyber Summit in New York City on Wednesday, Rob Silvers, undersecretary for policy at the Department of Homeland Security, urged vigilance from companies and other organizations. “I wouldn’t get too complacent. We see enough attempted intrusions and successful intrusions every day that we are not letting our guard down even a little bit,” he said. “Defense matters, resilience matters in this space.”

    Dan Tentler, a founder of the attack simulation and remediation firm Phobos Group who worked in Twitter security from 2011 to 2012, points out that while current chaos and understaffing within the company does create pressing potential risks, it also could pose challenges to attackers who might have difficulty in this moment mapping the organization to target employees who likely have strategic access or control within the company. He adds, though, that the stakes are high because of Twitter’s scale and reach around the world.

    “If there are insiders left within Twitter or someone breaches Twitter, there’s probably not a lot standing in their way from doing whatever they want—you have an environment where there may not be a lot of defenders left,” he says.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticlePsychedelic drugs may reopen critical learning periods in the brain
    Next Article Next Congress must confront China, strengthen US global leadership without harming American businesses

    RELATED POSTS

    AI voice startup Vapi hits $500M valuation after winning Amazon Ring over 40 rivals

    May 12, 2026

    The FCC Received Hundreds of Complaints About Bad Bunny’s ‘Vulgar’ Super Bowl Performance

    May 11, 2026

    Korea’s biggest manufacturers back Config, the TSMC of robot data

    May 11, 2026

    Could Contact-Tracing Apps Help With the Hantavirus? Not Really

    May 10, 2026

    Voice AI in India is hard. Wispr Flow is betting on it anyway.

    May 10, 2026

    Best Live-Captioning Smart Glasses (2026), WIRED tested

    May 9, 2026
    latest posts

    VOTE: Best Grunge Godfather – Nirvana vs. Pearl Jam

    It’s grunge’s ground zero! This week in Chuck’s Fight Club on the Loudwire Nights radio show, we’re…

    Trump piles on the charm offensive ahead of meeting with China’s Xi—Musk and Cook invited

    May 12, 2026

    Trump Falls Asleep Multiple Times During Women’s Health Event In Oval Office

    May 12, 2026

    California billionaire Tom Steyer dodges AOC’s billionaire wealth claim

    May 12, 2026

    AI voice startup Vapi hits $500M valuation after winning Amazon Ring over 40 rivals

    May 12, 2026

    A new tectonic plate boundary could be forming in southern Africa

    May 12, 2026

    Has streaming killed Star Wars?

    May 12, 2026
    Categories
    • Books (1,238)
    • Business (6,141)
    • Events (52)
    • Film (6,078)
    • Lifestyle (4,175)
    • Music (6,196)
    • Politics (6,141)
    • Science (5,496)
    • Technology (6,073)
    • Television (5,760)
    • Uncategorized (7)
    • US News (6,130)
    popular posts

    Deleted scene reveals Civa Tribe using fishing gear from Reward Challenge win

    David Kinne is on the Survivor 48 cast. Pic credit: Robert Voets/CBS A Survivor 48…

    Canada wildfires: How long does wildfire smoke last and is it dangerous?

    June 7, 2023

    A Recurring Dream Inspired This “Cozy Apocalyptic” Novel

    September 17, 2024

    What Is Enneagram—an Expert Shares Everything to Know

    February 9, 2023
    Archives
    Browse By Category
    • Books (1,238)
    • Business (6,141)
    • Events (52)
    • Film (6,078)
    • Lifestyle (4,175)
    • Music (6,196)
    • Politics (6,141)
    • Science (5,496)
    • Technology (6,073)
    • Television (5,760)
    • Uncategorized (7)
    • US News (6,130)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    A new tectonic plate boundary could be forming in southern Africa

    May 12, 2026

    Has streaming killed Star Wars?

    May 12, 2026

    ‘American Idol’s Hannah Harper Is 2026 Winner: See Her Reaction

    May 12, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT