Jul 17, 2020

Twitter hack: how bad was it?

Technology
Cybersecurity
Kayleigh Shooter
3 min
.
We take a closer look at the hack that targeted social media giant, Twitter, and how it could have been prevented...

 On Wednesday, the social media platform Twitter suffered a cyber attack from bitcoin scammers. The hackers targeted high profile accounts such as Elon Musk, Kayne West and Barack Obama. 

It is believed that the hackers gained access to an internal admin tool which therefore allowed them to gain such sensitive information and access.

Many questions are being asked of Twitter, how did hackers penetrate the security of such a high profile platform? 

Twitter is the social media tool of choice for many high profile celebrities and politicians so cyber attacks like this are stress inducing for many. It is also the platform of choice for 330 million users, who are vulnerable to the cyber attack.

The case of the cyber attack has been handed over to the FBI to further the investigation to try and prevent this sort of cyber attack occurring again, however it is not as easy as that as scammers and hackers are forever finding new ways to steal sensitive information. Phishing attacks like this are all too common.

undefined

After this attack and to diminish any cyber threats in the future, Twitter is being urged to adopt end-to-end encryption for direct messages. 

It is unarguable that direct messaging can contain some of the most sensitive information on the platform as we are all led to believe that it is safe and secure. However they are not as safe as Twitter would want us to think, they are vulnerable to internal compromise, because they are not end-to-end encrypted. End-to-end encryption will provide a robust extra layer of security through an internal safeguard. Messaging platforms such as Whatsapp and Facebook iMessage have already adopted end-to-end encryption. 

However, it is relatively easy to trace the source of any Bitcoin transactions so it is hoped that the culprit will be caught and apprehended soon. 

Twitter has confirmed that 130 high profile accounts were targeted in the attack however the social media giant insists that only a small portion of the targeted accounts were actually compromised. 

It still is not clear what the hackers intentions were and if any possible other cyber attacks are on the horizon. It is also unknown the financial implications of the hack.

undefined

There is one question that is on all of our minds following this high profile attack; how can we remain cybersecure? 

Cybersecurity will be at the forefront of all businesses right now as we are all on high alert.

One way to remain secure is to understand the data that your business collects and how you can keep that information secure, if your client’s sensitive data is leaked the impact could be detrimental to your business and its reputation.

In addition, use multiple authentication factors throughout your company to make sure no outside personnel gain unauthorized access to personal information.

You need to always assume that there is a vulnerability in every cyber situation, you are never one hundred percent safe from a vicious attack like this.

Tweet us at @TechnologyMagBC and let us know your opinions on the cyber attack, could it have been prevented?

Share article

May 12, 2021

Confluent announces new private cloud building platform

Cloud
Data
Technology
Digital
2 min
Confluent launches its Kubernetes platform, providing developers a cloud-native data streaming experience within private cloud infrastructure

Confluent, a platform that sets data in motion, today announced Confluent for Kubernetes, the first platform purpose-built to bring cloud-native capabilities to data streams in private infrastructures.

Confluent for Kubernetes allows platform teams to bring much of the same cloud-native experience found within Confluent Cloud to their self-managed environments while enabling operations teams to retain control of their data and infrastructure. As a cloud-native solution, Confluent for Kubernetes helps achieve faster time-to-value and reduce operational burdens with a fully elastic and scalable cloud-native experience in private infrastructure.

“To compete in the digital realm, organisations need to quickly deliver personalised customer experiences and real-time operations, which are only possible with access to data from all environments and cloud-native advantages,” said Ganesh Srinivasan, Chief Product and Engineering Officer, Confluent.

“For organisations that need to operate on-premises, we’re bringing the benefits of cloud computing to their private infrastructure with Confluent for Kubernetes. Now, any company can build a private cloud service to move data across their business regardless of its environment.”

 

How can Confluent for Kubernetes help?

Organisations who are transitioning to the cloud or who need to keep workloads on-premises can use Confluent for Kubernetes’ cloud-native capabilities, including a declarative API to deploy and operate Confluent. According to the company, the platform also makes moving applications to the public cloud easier by ‘seamlessly migrating workloads to wherever your business needs them with the ability to connect and share data with Confluent Cloud’.

  • Enhanced reliability – As a cloud-native system, Confluent for Kubernetes detects if a process fails and will automatically restart processes or reschedule as necessary. Automated rack awareness spreads replicas of a partition across different racks, improving the availability of your brokers and limiting the risk of data loss.

  • Automated elasticity – Meet changing business demands with the ability to scale up using API-driven operations. The platform will automatically generate configurations, schedule and run new broker processes, and ensure data is balanced across brokers so that clusters can be efficiently utilised.

  • Simplified infrastructure management – Confluent for Kubernetes extends the Kubernetes API, enabling organisations to define the desired high-level state of clusters rather than manage all the low-level details. This infrastructure-as-code approach reduces the operational burden and achieves a faster time to value, while enhancing security with standards that can be easily and consistently deployed across an organisation.

Share article