Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity

    Twitter Leak Illustrates Google Chrome OS Security Hazards

    Written by

    Jack Margo
    Published July 16, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      This week, Twitter had sensitive documents leaked in a roundabout method that involved a Twitter employee being phished and their Google password used to access sensitive data stored online in Google Apps. TechCrunch, the final recipient of these documents, vigorously defended their position on republishing the found Twitter documents citing leaks (in whatever form) have always existed and served as an information source. While true in a journalistic sense, it opens the door to a greater question of data security in a world where all your information is stored online in some fashion. Protecting your personal information on the Internet has been an ongoing struggle. Every time you interact, whether it’s a post to a blog, comment in a forum or just “tweet,” you are growing the hacker target on your back. Take this example:

      I am on Twitter and micro-blog regularly to my account. From just my Twitter account, you can get my full name and location. Now, within a few clicks you can probably trace down my e-mail address from some previous post to a forum, newsgroup or even comments on an article in certain instances. At that point, even a semi-dense hacker has enough information to launch a targeted phishing attempt against me. Granted, I triple check any links I get in e-mail to ensure it takes me where I am supposedly going, but I am someone who works in the trenches of the online industry and have been trained from DNA up to be careful of any kind of attacks.

      Google’s announcement of Chrome OS, an operating system that is enhanced by Internet connectivity, creates a security conundrum of mammoth proportions for the general population…illustrated by the Twitter security breach. If you are compromised in a world of always-on connectivity and data living in a personal cloud, the ramifications are no longer just limited to someone reading your e-mail. They now have access to anything that you did and can, in fact, lock you out of your own account.

      Grant Gross of PC World wrote an article last week citing how the new Google Chrome OS promises a world with no malware, no security updates and no viruses. Sure, Google has shown that it is pretty good with spam guarding your mail accounts, but when it comes to protecting the user against itself it’s not just Google but everyone that has failed. Gross’ article contains a quote from Brian Chess, CSO of Fortify Software that sums up the real issue – “The question is, is the system going to be able to do a reasonable job of defending itself even in the face of a certain amount of user error?”

      Every generation that adapts to new technology increases their collective intellect regarding that technology. From the blinking 12:00 on your parents’ VCR to cell phones to computers, each successive age group to adapt to the new technology takes as rote things the previous age group struggled with. However, the Internet provides a mixed bag of every demographic across the globe. Over time, those groups will adapt and understand the underlying nuances of new technology a little more.

      However, a vast majority of these people currently look at Windows OS as a black box that presents them a nice UI and relatively secure access to their personal things…so much so that people have no problem keeping their taxes, personal data and even lists of their passwords on their PCs. Even today, spyware and malware, phishing and other attacks cause a boom for businesses that focus on PC security and data recovery. Fast forward to a world where this data is living not only on their computer but also accessible through some password scheme on the Internet and you’ve got a formula for potential disaster.

      Yes, Google is aware of this. Possibly no one understands online user behavior better than Google, evidenced by their success both in product development, adoption and their beefy stock price. However, the intellectual gap may prove tougher to solve than any of its technical hurdles. Let’s hope, for the sake of the everyman, that Chrome OS has such great security features that it stops users from inadvertently giving away their data. Maybe the leak at Twitter is a good place to start with beta testers.

      Jack Margo is senior vice president of Internet operations at Ziff Davis Enterprise.

      Jack Margo
      Jack Margo

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.