My organization uses Twitter to communicate with customers, so I was concerned by reports of man-in-the-browser...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
attacks affecting Twitter users. Could you explain what attackers are doing and if there is any way to defend against them?
Ask the Expert!
SearchSecurity expert Nick Lewis is standing by to answer your questions about enterprise security threats. Submit your question via email. (All questions are anonymous.)
Social media security is a quickly evolving area of information security. As enterprises increasingly use social media accounts to engage customers and promote brands, attackers, as they are always wont to do, will follow enterprise activity and seek to exploit any and every weakness they can find in the major social media platforms.
There are several ways to protect your organization's accounts against Twitter-based malware. First and foremost, post links for Twitter followers that promote security awareness around Twitter usage; Twitter's official security awareness page is the obvious place to start, but organizations such as Forrester also maintain information to promote better social media security. Beyond user awareness, organizations should ensure that any system or user with access to an enterprise Twitter account is using a secure computer to help minimize the impact if the computer is compromised. Simple steps to ensure such security measures include making sure that users' software has been updated to the most recent versions and rolling out security patches from the likes of Microsoft and Adobe as soon as possible.
As for Twitter-specific security measures, an organization could detect if its Twitter account was compromised by downloading a copy of all its tweets and running any posted URLs through an anti-malware service to see if any of the links were malicious. If a malicious link is found, this could be a good indicator the Twitter account was compromised, and if this is the case, the organization should delete the malicious tweets and inform its followers that its account was breached so they can be aware their own systems may be compromised. In response to recent attacks on high-profile accounts, Twitter has also enabled two-factor authentication capabilities, which could further secure Twitter accounts against various attacks.
Dig Deeper on Social media security risks
Related Q&A from Nick Lewis
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis ...continue reading
A Gmail phishing attack brought users to fake login pages designed to look like Google's. Expert Nick Lewis explains how users can prevent similar ...continue reading
A HummingBad malware variant, HummingWhale, was discovered being spread through 20 apps on the Google Play Store. Expert Nick Lewis explains the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.