Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • IT Management

    Google, Twitter Defend Google Apps, Cloud Computing from TechCrunch

    Written by

    Clint Boulton
    Published July 15, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Google and the cloud computing model were the victims of some jibes from popular blog TechCrunch in the wake of a personal e-mail account hack at Twitter.

      The attack, centered on the security of Google Apps’ password system, rekindled the debate about whether it is safe for businesses to use the Internet to store sensitive documents and forced Google to defend itself, with Twitter coming to Google’s aid July 15.

      The brouhaha started when TechCrunch came into possession of some 300 documents a hacker named Hacker Croll allegedly swiped from Twitter back in May. The documents contained anything from executive meeting notes and financial projections to such banalities as meal preferences, calendars and phone logs of Twitter employees.

      Twitter co-founder Biz Stone confirmed the hack after TechCrunch posted screenshots of some of the documents, adding that the hacker retrieved information from an employee’s personal e-mail account, believed to be a Yahoo Mail account.

      Twitter has not confirmed this detail, but news Websites CNET and the New York Times claim a weak password recovery system from Yahoo enabled Hacker Croll to access the employee’s Google Apps account. This account include Google Docs, Calendars and other Google apps Twitter relies on for sharing notes, spreadsheets, ideas, financial details and more within the company, Stone said.

      TechCrunch founder Michael Arrington July 14 suggested the password security for Google Apps was weak, noting in a comment on his blog that “the original security hole seems to be Google, via Google Apps for your Domain. Some passwords were guessed and things started to fall apart from there. Most (or all) of these documents were downloaded from Google’s servers.”

      Less than a day later, Arrington defended his right to publish the documents when he wrote:

      ““It’s not our fault that Google has a ridiculously easy way to get access to accounts via their password recovery question. It’s not our fault that Twitter stored all of these documents and sensitive information in the cloud and had easy-to-guess passwords and recovery questions. … Hopefully this situation will encourage Google and Google users to consider more robust data security policies in the future.”“

      Michael Eisenberg at SeekingAlpha rushed to condemn the security of cloud computing: “The bottom line is that many startups and an increasing number of large companies are using Google Apps for critical company documents. Most of them think that they are living securely. They are not. … This is a risk for Google going forward and an interesting nod that cloud security companies are needed.”

      Google and Twitter Deny Weakness in Google Apps

      Both Google and Twitter moved to put the kibosh on these insinuations about Google’s account security protocols and the cloud having weak security. Stone added in his post:

      ““This attack had nothing to do with any vulnerability in Google Apps, which we continue to use. This is more about Twitter being in enough of a spotlight that folks who work here can become targets. … This isn’t about any flaw in web apps, it speaks to the importance of following good personal security guidelines such as choosing strong passwords.”“

      Stone also stressed that this was not a hack on Twitter, but a personal attack that led to the theft of private company documents.

      Google, meanwhile, also addressed the questions about its Google Apps security. Google Engineering Director Macduff Hughes wrote in a blog post:

      ““We run our own business on Google Apps, and we’re highly invested in providing a high level of security in our products. While we can’t discuss individual user or customer cases, we thought we’d try to clear up any confusion by taking some time to explain how account recovery works with various types of Google accounts and by revisiting some tips on how users can help keep their account data secure.”“

      Noting that password recovery is one of the more common requests for assistance Google receives from its Gmail users, Hughes said Google recommends security questions and a secondary e-mail address, as well as an option to input a mobile phone number to assist with account recovery.

      But Hughes said password recovery is another animal altogether for Google Apps, for which there is no password recovery process for individual Google Apps users. Hughes said users must get new passwords from their domain administrator.

      Pundits were not as diplomatic in their defense of Google and its cloud computing approach. In a post titled “The Twitter hack: Let’s not start blaming Google or the cloud,” Sam Diaz at ZDNet wrote:

      ““Sure, maybe Google could come up with a better password-recovery system-but this isn’t Google’s fault. Bottom line: Twitter used an easy-to-guess password and recovery question. That’s how the hacker was able to get in-not because Google has some sort of security hole.”“

      GigaOm’s Jordan Golson wrote that the issue may be chalked up to companies using poor authentication and password protocols to secure their data.

      Clint Boulton
      Clint Boulton

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×