Advertisement
Canada markets open in 7 hours 18 minutes
  • S&P/TSX

    21,740.20
    -159.79 (-0.73%)
     
  • S&P 500

    5,061.82
    -61.59 (-1.20%)
     
  • DOW

    37,735.11
    -248.13 (-0.65%)
     
  • CAD/USD

    0.7248
    -0.0005 (-0.07%)
     
  • CRUDE OIL

    85.93
    +0.52 (+0.61%)
     
  • Bitcoin CAD

    86,840.24
    -3,502.30 (-3.88%)
     
  • CMC Crypto 200

    885.54
    0.00 (0.00%)
     
  • GOLD FUTURES

    2,403.70
    +20.70 (+0.87%)
     
  • RUSSELL 2000

    1,975.71
    -27.47 (-1.37%)
     
  • 10-Yr Bond

    4.6280
    0.0000 (0.00%)
     
  • NASDAQ futures

    17,858.50
    -17.75 (-0.10%)
     
  • VOLATILITY

    19.23
    +1.92 (+11.09%)
     
  • FTSE

    7,965.53
    -30.05 (-0.38%)
     
  • NIKKEI 225

    38,517.06
    -715.74 (-1.82%)
     
  • CAD/EUR

    0.6827
    +0.0003 (+0.04%)
     

Here's How Hackers Took Over The Burger King Twitter Account

Burger King and Jeep both saw their Twitter accounts get hacked this week.

How and why does this happen?

Bruce Schneier is a revered computer security expert, prominent for his thoughts on the intersection of technology, security, and trust.

He was kind enough to fill us in on the details surrounding how hacks like these are possible.

How a Twitter account gets hacked

A person attempting to break into an account isn't hunched over a keyboard typing guessed password after guessed password until something works. He'll use a password cracker.

A password cracker is a piece of software that employs a technique to guess passwords much more quickly than a human ever could. The two most common approaches are the "brute force method" and the "dictionary method." While the dictionary method simply tries every word in a dictionary until it works, the brute force method tries every possible combination of characters (including numbers and punctuation) until something works.

ADVERTISEMENT

Brute force will always eventually reveal the password, but it might take a long time.

Cracking software is only getting better, as Schneier explains on his blog:

"It's not just computing speed; we now have many databases of actual passwords we can use to create dictionaries of common passwords, or common password-generation techniques. (Example:dictionary word plus a single digit.)"

And as the cracking software gets better, the passwords get weaker and therefore easier to hack.

What Twitter can do to help protect its users

We asked Schneier if Twitter could implement a two-step verification login system (which Google's been using for a long time now). He said, "Yes, but usability is the most important consideration here. Twitter wants people to use their system, not be annoyed by the security."

Strategies to come up with your own secure passwords


click to view large

Who better to ask for password advice than a security expert? Schneier actually endorses the above comic, saying it's "a good method."

Schneier's personal strategy is to use an open source program of his own design called Password Safe that generates super-secure passwords based on a string of text that you input.

You can use it yourself! It's free and you can read the details on it right here.

The future of security

My thought was that as computers get more powerful, that will make it easier to crack passwords in the future, but Schneier was quick to set me straight: "I'm not sure increased computing power has anything to do with it."

He suggests that the biggest threat to computer security is complexity. As he put it, "the internet and all the systems we build today are getting more complex at a rate that is faster than we are capable of matching. So security in reality is actually improving but the target is constantly shifting and as complexity grows, we are losing ground."

The bottom line

Your email, Twitter, and other accounts are only as safe as your password is secure. Be smart as you pick them. Use the methods described above – they come endorsed by a leading cryptographer and technologist.

He's quite literally giving you the tools to keep your data as secure as he does.



More From Business Insider