Obviously, you should start by picking a strong password that's not a dictionary word or easily guessable. But that password … Read more
Twitter's latest security hole has less to do with its users than it does with its staff, but lessons can be learned on both sides.
In the case of Jason Goldman, who is currently Twitter's director of product management, the simplicity of Yahoo's password recovery system was enough to let a hacker get in and gain information from a number of other sites, including access to other Twitter staff's personal accounts.
The aftermath of the hack, which took place in May, is just now coming to fruition. Documents that a hacker by the alias of Hacker Croll recovered from Goldman's account and others (including Twitter co-founder Evan Williams) could be a treasure trove of inside information about the company and its plans.
While Croll was planning to release the entire batch publicly (and at once), tech blog TechCrunch posted news late Tuesday that it had received them and was considering posting the details of at least some of them.
Although it seems that Twitter has been thrust into this situation a bit unfairly, a hack along these lines could have happened to the executives of more Web companies than anybody would like to admit. What it really highlights is the extreme interconnectedness of the social Web: with the likes of e-mail contact importing and data-portability services like Facebook Connect now commonplace, a savvy hacker can have access to multiple accounts simply by accessing one.
A post Wednesday on Twitter's official blog highlights just how far-reaching this can be.
"About a month ago, an administrative employee here at Twitter was targeted and her personal email account was hacked," the post from co-founder Biz Stone read. "From the personal account, we believe the hacker was able to gain information which allowed access to this employee's Google Apps account which contained Docs, Calendars, and other Google Apps Twitter relies on for sharing notes, spreadsheets, ideas, financial details and more within the company."
Following that attack, Twitter conducted a security audit, and Stone's post says that there was not a security vulnerability in Google Apps and that Twitter continues to use the suite internally. A separate hack targeted the account of CEO Evan Williams' wife, and from that some of Williams' personal accounts were accessed as well, Stone explained.
But Twitter is front and center in the news these days, and is now talked about as a communications protocol as much as a Web start-up. Not only does that make it a particularly appealing target, but also… Read more
On today's Buzz Out Loud, Natali and Molly form a new Amazonian society in advance of the development of artificial sperm. But in much more important news, Google is finally building the thin-client, Netbook-friendly operating system that Molly predicted back in 2005. And poor Yahoo is stuck in 2005: it just announced Search Pad. Aw. Poor Yahoo.Listen now: Download today's podcast Subscribe now: iTunes (audio) | iTunes (video) | RSS (audio) | RSS (video) EPISODE 1014
Introducing the Google Chrome OS http://googleblog.blogspot.com/2009/07/introducing-google-chrome-os.html http://news.cnet.com/8301-17939_109-10281744-2.html
Which Molly predicted in 2005! … Read more
I like to play tennis, especially on the Wii where I don't have to leave the couch to score an ace. But while Wii Sports tennis is a very fun game--and it uses the Wii's accelerometers well--it's not the real thing. Some people want to play real tennis in the real world. And some people like to win.
Because of this, Mans Shapshak, an avid tennis player as well as a gear hacker, has come up with a novel way to combine fake tennis with real tennis to improve his real-world game using a hacked Wiimote.
The … Read more
We finally get our hands on the much coveted Bonch aka Bonnie Cha, Senior Editor for CNET.com. No, we don't grill her on the latest cell phones at CTIA or the proper way to make a Superman cape. Instead, we try to guess Sarah Palin's e-mail password, run through a list of Jeff's mancrushes, do the Cha Cha on the air, and take a visit to the Sex Museum, aka Wilson's cellar.
Wow, did someone open up a tank of nitrous oxide in here? Today's show is literally 40 minutes of constant laughter, and we owe that to our special guest, Bonnie Cha! She's a Senior Editor of mobile phones at CNET and one of the first people I ever met at the San Francisco office. Please don't be operating heavy machinery while listening to today's show! We do taint, tarnish, and otherwise frack up Bonnie's "innocence" by explaining the science behind "Supermanning that ho," which goes over surprisingly well with her. We also debut a service called Cha Cha that allows you to text or call a 24/7 concierge service that will literally answer any inquiry, such as "Is the 404 going to be taken off the air tomorrow?" or "Why is Bonnie's nickname The Bonch?" Of course, all of these questions can be answered using another service; here in 2008 we call it Google. Furthermore,why would I use the Cha Cha when I know Wilson will always be within arm's length of a computer? The man is physically tethered to the Internet. Finally, we take a look at the NBC fall lineup and Bonnie asks the question that's on all of our minds: Jeff, how can you like Sex and the City and still urinate standing up?EPISODE 187 Download today's podcast … Read more
OK. Here's how to do it.
Go to the Firefox … Read more
During the WWDC keynote, AT&T was strangely absent from Apple's list of carriers that will support tethering in iPhone OS 3.0. AT&T has since explained that it will support tethering later this summer, but many iPhone users are champing at the bit for the added functionality. If you're one of the eager masses, use this how-to to enable tethering on any iPhone running iPhone OS 3.0--without jailbreaking--on a Mac. (Other blogs have reported Windows tethering steps; please see our links at the end of this piece.)
Difficulty level: Medium
What you need: &… Read more
The recent handful of news-centric shows forced us to depart from our normal story format, but with Palm Pre, Apple iPhone/Macbook/Pro news out of the way, we get back to our roots and tackle a ton of hilarious stories backed up in the queue. Time for some spring cleaning!
Starting this Saturday, June 13, Facebook will roll out a service called "Facebook Vanity" that lets users choose a specific username that will make it easier to direct friends to their profile address. For example, our friend Richard Topping can choose to assign his username and point people to "facebook.com/richardtopping" instead of just a string of random numbers. It's a great idea and makes pimping yourself out a lot easier, but be sure to wake up early on Friday night to be the first to register your own name. That is, unless your name is Wilson Tang--who the hell would want that awful handle?
Next in the lineup are two Twitter services that show you who are, and more importantly who ARE NOT your true friends. FriendorFollow tells you who you are following that isn't following you back in return. Sorry to open up the floodgates on this one, but beware the angry tweets directed your way that'll read something like, "WTF?! @Malusbrutus stopped following me, that SOB! I'm so not signing your yearbook!"
Or, if you're really desperate, you can sign up for Useqwitter and the site will e-mail you immediately when one of your friends stops following you on Twitter, and it'll also tell you exactly which of your tweets caused their departure. For example, a message you receive from Qwitter could look like this:
Justin Yu (malusbrutus) stopped following you on Twitter after you posted this tweet:
OMG this Dave Matthews Band concert surreausly rulez0rZ, I luvvv the way Davey can't seem to open his whole mouth when he sings! Creed is performing next, I'm in muzik HEAVEN!
EPISODE 360 Download today's podcast Subscribe in iTunes audio | Suscribe to iTunes (video) | Subscribe in RSS Audio | Subscribe in RSS Video… Read more
While some of you might think of the "Blender Defender" as mean, I don't. Animals kept as pets need to learn the rules. Cats and dogs, though, are notorious for deciding the rules don't apply when we, the owners, are away.
That is why one clever soul rigged up a blender filled with water to a motion-activated wireless Webcam aimed at the house plants his cat liked to nibble. When the cat would enter the frame, a networked upstairs computer would activate the water-filled blender--and a strobe light next to it--via an X10 wireless home automation module. … Read more
A T-Mobile spokesman said on Tuesday that data someone posted to a security e-mail list over the weekend was legitimate T-Mobile data but not customer information, and that the phone company's network was not hacked or breached as the poster claimed.
The statement raises more questions than it answers. If indeed there was no network hack, could there have been an inside leak? Or could it have been something as low-tech as dumpster diving, in which records are obtained from trash bins outside a company's offices?
All T-Mobile would say is that it is investigating how the information … Read more