Twitter's Solution to Hacking: Two-Step Authentication

image
Published: 01 May, 2013
2 min read

Twitter's two-step authentication Shutterstock: JMIKs

It's been a hectic few weeks for Twitter, with the acceleration of false allegations from the Boston bombing and repeated high profile hacking incidences drawing national attention.

The Associated Press most recently fell victim to the attacks, admittedly led by the Syrian Electronic Army, or SEA, who sent out a tweet reading "Breaking: Two Explosions in the White House and Barack Obama is injured." In a matter of seconds, the Twittersphere responded and the falsely reported news spread like wildfire across the Internet, having both digital and real-world implications.

In less than 140 characters, Twitter rocked the stock market, leading to a 100 point drop in the Dow Jones Industrial Average. While the stock market recovered almost as fast as it plummeted, the panic that ensued illuminates a fascinating -- and potentially dangerous -- effect of an SEC decision made earlier this month.

In a press release dated April 2, the Securities and Exchange Commission (SEC) gave companies and investors the green light to share key information on social media sites. Recognizing that "most social media are perfectly suitable methods for communicating with investor," the decision signifies the growing importance of social media in company relations with investors.

This means it is now OK for companies to share valuable information and data with investors in a click of a button, a practice that has empirically had a substantial effect on the stock market.

With power comes great responsibility, however, and thus arises the need for security and verification. Recognizing the need for increased security on the social media site, Twitter sent out a memo earlier this week warning companies of the dangers of outside attacks.

“There have been several recent incidents of high-profile news and media Twitter handles being compromised,” Twitter said in the memo. “We believe that these attacks will continue, and that news and media organizations will continue to be high value targets to hackers.”

Its solution is two-step authentication. Initially reported by Wired, Twitter has already conducted internal testing on a system that would require an extra code to be entered to access one's Twitter account. While Twitter has not officially announced a timeline for the service, reports indicate that the two-step authentication would send the additional code either as a text message or email.

Had this already been in place, last week's AP hacking would have likely been prevented. According to AP, the hackers probably gained access by using phishing attacks, meaning somebody with access to the account likely clicked on a link inside an “impressively disguised” phishing email.

IVP Donate

You Might Also Like

Ballrooms, Ballots, and a Three-Way Fight for New York
Ballrooms, Ballots, and a Three-Way Fight for New York
The latest Independent Voter Podcast episode takes listeners through the messy intersections of politics, reform, and public perception. Chad and Cara open with the irony of partisan outrage over trivial issues like a White House ballroom while overlooking the deeper dysfunctions in our democracy. From California to Maine, they unpack how the very words on a ballot can tilt entire elections and how both major parties manipulate language and process to maintain power....
30 Oct, 2025
-
1 min read
California Prop 50 gets an F
Princeton Gerrymandering Project Gives California Prop 50 an 'F'
The special election for California Prop 50 wraps up November 4 and recent polling shows the odds strongly favor its passage. The measure suspends the state’s independent congressional map for a legislative gerrymander that Princeton grades as one of the worst in the nation....
30 Oct, 2025
-
3 min read
bucking party on gerrymandering
5 Politicians Bucking Their Party on Gerrymandering
Across the country, both parties are weighing whether to redraw congressional maps ahead of the 2026 midterm elections. Texas, California, Missouri, North Carolina, Utah, Indiana, Colorado, Illinois, and Virginia are all in various stages of the action. Here are five politicians who have declined to support redistricting efforts promoted by their own parties....
31 Oct, 2025
-
4 min read