10 Best Tweets on Security in 2014

Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals.  So, as way of looking back we

Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals.  So, as way of looking back we decided to pull together ten of the best security related tweets.

Did we miss one?  Let us know in the comments below!

1. Pumpwater – In March a cyber-criminal who acted on behalf of ‘Pump Water Reboot’ hacker group started a series of DDoS attacks on a bunch of Russian web services — from popular online communities to banks. Each victim was asked to pay $1000 ransom to stop the attack.
In this particular post, the criminal threatened a Russian banker, Oleg Tinkov, founder of Tinkoff Credit Systems which is online specialized bank.

(Translation: Your site is under DDoS attack. We offer a solution to this problem. The attack will stop if you are willing to pay $ 1,000.)

It didn’t take long for things to happen: by the summer, the criminal was caught by police and was sentenced to 2.5 years of probation and a fine of 12 million rubles (about $400,000 at that moment).

2. Heartbleed — The vulnerability that threatened over two thirds of the internet. If you’re unsure what the Heartbleed bug is, you can get up to date on our blog post here.  However, if you’re after a succinct and precise explanation, look no further than XKCD:

Despite all the press attention that the bug received (it even got it’s own logo) there’s still tens of thousands of compromised servers out there.

3. The CIA join Twitter – In our opinion, the best tweet of the year was goes to (believe it or not) the CIA.  It just goes to show that even brands such as this can use social media well:

4. Russian PM Twitter – In mid-August there was that sooner or later happens with almost every modern politics. Someone hacked Twitter account of Russia’s Prime Minister Dmitry Medvedev and made a lot fun of it.

medvedev-was-hacked

(translation from Russian: I resign. I am ashamed of the government’s actions. I’m sorry.)

At the same time other accounts of Medvedev were also hacked, which led to private photos and correspondence from Medvedev’s being leaked.  All these posts have subsequently been removed and the whereabouts of the hackers remains unknown.

5. Celebrity leaks – Two weeks later there was another leak, this time on a much larger scale was to happen.  Leaked nude images of celebrities was about to cause a social media storm.

Subsequently nick-named “The Fappening” by Reddit users, there was huge publicity around the pictures, but not just because of the nature of the images.  Apple’s iCloud services, where the pictures had been stored took a lot of flack for their encryption.  Apple would later announce full encryption as part of iOS 8.

6. Shell-shocked – Autumn was especially eventful. In September a new vulnerability was found in Bash shell. Popularly known as Bashdoor or Shellshock, it was second time within one year where millions of computers (mostly servers) were compromised. The man who has discovered this bug didn’t post anything in his Twitter immediately. However, later he posted that the bug was not actually that new at all:

Similar to Heartbleed, Shellshock will haunt IT security for years to come.

7. BADUSB – A couple of week later the world found out about another global threat: in early October two researchers announced that every USB-device on the planet is fundamentally vulnerable. For some reasons, these guys didn’t talk about this it, but we did:

It is still unclear what we should do globally to protect ourselves from this bug. There is only one known good practice: do not use untrusted USB-devices and that even includes mice and keyboards.

8. Dropbox hacked? – In mid-October there was another leak, this time victims were Dropbox users. Company representatives promptly declared that service wasn’t hacked and leaked data was collected in some other ways.

9. Introducing Digits – The end of October was marked by event that (sadly) didn’t receive enough attention. Twitter announced plans to replace passwords with another, more advanced authentication system. And not only passwords for the accounts of its own users: Twitter offers third-party developers the ability to use the system as well.

There were many attempts to get rid of passwords and, as we have seen, nobody has been able to achieve this so far. But it is possible that Twitter will succeed and in a few years we will finally stop using this old good authentication method.

10. Sony – As for passwords: never store it in unencrypted file on your PC. Otherwise, you may well face the same thing that happened to Sony Pictures. The, now infamous hack, was preluded by the hacking of the Starship Troopers twitter account:

hacked-by-gop-sony-pictures-starship-troopers

The aftermath was swift and brutal with everything from emails to movies being dumped on file-sharing sites across the world.  Sony have been widely criticised by IT professionals for poor security pratices (yes, even keeping passwords in plain text files.) You can learn more about what happened with Sony in our blog post.

Tips