Donald Trump's Twitter Account Is A Security Disaster Waiting To Happen

The most powerful publication in the world today is Donald Trump&;s personal Twitter account. In the past six weeks, it has moved markets, conducted shadow foreign policy, and reshaped the focus of media around the world. Just today, it caused Toyota stock to plummet. It is also shockingly insecure.

That insecurity was acceptable when @realdonaldtrump concerned itself with Kristen Stewart cheating on Robert Pattinson and how thin people don&039;t drink Diet Coke. And yet Trump&039;s newfound influence — combined with the unpredictability of his tweets — makes the president-elect&039;s account a particularly tempting target for hackers.

That&039;s especially true because there is a large fortune that could be made in a single 140-character message. If someone was able to gain access to Trump&039;s Twitter, he or she could tweet approvingly or disapprovingly about a company (as Trump has done) and play the stock market accordingly — or cause others to do so. A market-tracking app called Trigger has already set up an alert that that responds whenever Trump tweets about publicly traded companies.

If the hacker was geopolitically motivated, he or she could tweet favorably or unfavorably about a country or a leader (as Trump has done) and alter foreign affairs. Or if the hacker had a grudge, he could call his enemy out in a tweet (as Trump has done) and unleash the rage of Trump&039;s nearly 19 million followers. Plus, who knows what&039;s in Trump&039;s DMs?

And precisely because the president-elect&039;s tweets are so far afield of current president Barack Obama&039;s on-message, workshopped ones, someone with improper access to Trump&039;s account could accomplish his or her goals while staying in character as Trump. (A hack of the Associated Press Twitter account in 2013 that falsely asserted breaking news about an explosion at the White House caused the Dow to drop 150 points.)

This is not a far-fetched scenario. Putting aside the specter of state-sponsored Russian hacking, in the past year alone, the Twitter accounts of Kylie Jenner, Mark Zuckerberg, Keith Richards, Sundar Pichai, Drake, Travis Kalanick, the National Football League, and the foreign minister of Belgium (to name a few) were hacked or accessed by someone who wasn&039;t supposed to have access. Many of these infiltrations didn&039;t require sophisticated skills or the ability to hack Twitter. Bad actors can often gain access to an account through a third-party app that has permission to post to Twitter, for example. These hacks didn&039;t take the expertise or resources of a nation state; some of them were done by a Saudi teenager. And Trump&039;s account has been hacked before. In 2013, someone gained access to his account to tweet Lil Wayne lyrics.

So who is going to secure the president-elect&039;s account?

According to multiple people who have managed the campaign social media accounts of Hillary Clinton and President Obama, as well as the official presidential account, Twitter does not have any special security measures for politicians.

“I&039;ve never encountered a separate set of security features being available for public figures&039; social media accounts,” said Laura Olin, who ran Obama&039;s social media strategy in 2012. “They get two factor authentication like everyone else. I wouldn&039;t be surprised if that begins to change, especially after widespread Russian hacking.”

Twitter declined to comment for this story.

According to Alex Wall, who served as director of online engagement in the Obama White House, special security protocols do exist for the official @POTUS account — they just all come from the user side. These steps, set up by the White House Communications Agency (which provides “services and communications support to the president and his staff“) include multiple password layers and limiting the number of encrypted devices that can post to the official account.

“It&039;s a small handful of devices that are under significant security and handled with extreme care,” Wall said.

Wall, who was also director of social media for Hillary For America, said that the Clinton team planned on adopting the same protocols had she won. And if Trump would commit to adopting these precautions and tweeting only from the @POTUS account, Wall said, concerns about hacking would be lessened.

But that seems unlikely. In an interview earlier this week with Fox News, incoming White House press secretary Sean Spicer said that “He&039;ll probably be tweeting from both, or whatever he chooses.” Also worrisome is that both Spicer and incoming chief of staff Reince Preibus have promised to “reexamine” the traditional daily White House press briefing, a step that could lead to even more tweets. And it&039;s unknown how many devices have access to Trump&039;s Twitter account, let alone which third-party apps installed on those devices have been given permission to write to Twitter. (The Trump transition team did not respond to an email request for comment.)

All of which leaves the @realdonaldtrump as a vulnerable major target that could be exploited for financial gain, geopolitical instability, or worse. Scary&;

Quelle: <a href="Donald Trump&039;s Twitter Account Is A Security Disaster Waiting To Happen“>BuzzFeed

Here Are The Creative Ways The Obama White House Will Preserve Its Social Content

President Obama was the first US President to use Twitter, Snapchat, Facebook Live and YouTube to engage the public. Now, his White House has released its plans for what it will do with all that content he and his team created while in office.

After soliciting proposals for creative uses of the White House&;s social media data — spanning across platforms including Facebook, Twitter, and Vine and posted by Obama, the First Lady, The White House, and more — the White House today said it will rely on partners such as GIPHY, the MIT Media Lab, and the Internet Archive to preserve its posts and videos in a number of creative ways.

GIPHY, for example, created a page that displays the GIFs the White House shared while Obama was in office. The MIT Media Lab did an analysis of the White House&039;s Tweets to find out what topics it was discussing on Twitter from January 1, 2016 to October 3, 2016, and compared that to the topics that accounts discussing the 2016 election were tweeting about. And The Internet Archive is making its archive of Obama&039;s White House data available for download.

Until now, it was possible to scrape Twitter to get some of this data, but a comprehensive collection of the White House&039;s social data wasn&039;t easily accessible. This new effort it should make it easier to analyze the President&039;s social presence. The MIT Media Lab analysis, for instance, shows that President Obama was tweeting more about gun control and less about foreign policy and national security than other election-engaged Twitter users.

“Given that so much of the media (and social media) news cycle revolves around now and what&039;s next, it&039;s sometimes difficult to be able to look back, and in general none of us have the tools for it,” White House director of product Josh Miller told BuzzFeed News in an email. “These first tools will make it easier for citizens to conduct research, understand trends, and relive big moments, and more.”

Here are all the ways the White House is making the data available:

ArchiveSocial&039;s Search Box

This is a searchable database that “contains over 250,000 posts, photos, and videos shared by more than 100 official Obama White House social media profiles,” according to its website.

Rhizome&039;s Multimedia Essays

The digital art organization Rhizome is creating interactive essays filled with links that reveal how White House-related memes like Thanks Obama originated and went viral.

MIT Media Lab&039;s Electome Group&039;s Topic Analysis

The group explored “how the White House, President Obama, and the First Lady have used Twitter to communicate with the public,” according to its website.

Derek Lieu&039;s Tweet Language Analysis

Lieu, a programmer, analyzed the language the White House used in tweets, showing when it began embracing the term “Obamacare” and began using POTUS in earnest.

GIPHY&039;s Obama Page

The GIF search engine created a page with all the GIFs the White House shared while Obama was in office. And some other content, like Vines posted by the White House and related GIFs pulled in by the GIPHY team.

FeelTrain&039;s @Relive44 Bot

This bot will spend the next 8 years tweeting what the Obama White House tweeted over the past 8 years — in real time.

University of Texas-Austin and NYU&039;s School Projects

These two schools will use the data to teach. NYU&039;s Interactive Telecommunications Program is hosting an Obama-themed hackathon called the “Obamathon.” Amelia Acker, an assistant professor at UT-Austin, will put the data to use to teach topics like Metadata.

Internet Archive&039;s Archive

The Internet Archive will make the Obama White House&039;s data available for download on its site. It&039;s also hosting a hackathon of its own on Saturday, January 7. Here are some details from its website:

When Donald Trump is inaugurated as President on January 20, President Obama&039;s @POTUS Twitter account will be handed over to Trump. The new President will keep the account&039;s 13 million+ followers, but he will start with a fresh timeline containing no tweets.

Quelle: <a href="Here Are The Creative Ways The Obama White House Will Preserve Its Social Content“>BuzzFeed

Technical Project Manager- India

The post Technical Project Manager- India appeared first on Mirantis | The Pure Play OpenStack Company.
Mirantis, Inc. is looking for an energetic Technical Project Manager for OpenStack projects, who will be working on implementation of OpenStack based clouds for multiple customers. If you’re an ambitious Technical PM and thrive on getting tough, real-world problems solved with a smart, motivated team, you want to work here. Primary ResponsibilitiesWork closely with our customer to define how implementation of private cloud will increase their business agilityWork daily with project stakeholders, architects and offshore engineering team to deliverMitigate risks to make sure that the current deliverables will help achieve strategic goalsProvide complete visibility on the project through reporting and status meeting with senior managementDefine KPIs and collect metrics which show the picture of project executionActively participate in open source community including contributions based on deliverables made during the projectsQualificationsExcellent communicator with the focus on achieving customer’s business goalsReasonably technical and understand domain (primarily IaaS and PaaS space)Have background in Infrastructure, Networking, Data Center Management or related fieldsHands-on experience with linux and virtualizationPedantic to details and have an ability to track project executionKnow management practices and development methodologies but can adjust theprocess to what will work to get things doneUnderstand the challenges of working in distributed environment with multiple teams working on different problemsUnderstand how to navigate through complex structure of enterprise organizations to get things doneWhat We OfferWork with exceptionally passionate, talented and engaging colleaguesBuild large scale, innovative systems for mission-critical useHigh-energy atmosphere of a young company, competitive compensation package with strong benefits plan and stock optionsLots of freedom for creativity and personal growth The post Technical Project Manager- India appeared first on Mirantis | The Pure Play OpenStack Company.
Quelle: Mirantis

Amazon Inspector launches support for Ubuntu 16.04 and an AWS Lambda blueprint for assessment scheduling

Amazon Inspector is pleased to announce support for security assessments on Ubuntu 16.04 within Amazon EC2. You can now run assessments for Common Vulnerabilities & Exposures (CVE), Amazon Security Best Practices, and Runtime Behavior Analysis. To run vulnerability assessments for Ubuntu 16.04, simply install the Amazon Inspector AWS Agent on the desired EC2 instance, configure your assessment in the Amazon Inspector console, and run your assessment.
Quelle: aws.amazon.com