Hackers sent out a false tweet on the AP feed Tuesday reporting that thehad been bombed causing a temporary $200 billion drop instock markets. Theflagship news magazine shows, and 48 Hours, also had their Twitter accounts hacked.
For news organizations whose reputations are built on credibility, the concern is real particularly as social media feeds become an increasingly integral part of the news media's overall strategy.
RECOMMENDED:The media are really rushing to brainstorm about what they need to do to not only make sure that this doesnt happen again, but to reassure the public that they are reputable and trustworthy, says Peter LaMott of Levick, a consulting firm for media. What is more concerning about this AP episode is that it went right at the heart of what the company is all about its reputation for accuracy.
The number of such episodes have been on the rise in recent years, he says, noting that bothand Jeep were the victims of hacking pranks. In the AP's case, the Syrian Electronic Army known to support claimed responsibility for the hack.
Both the social media industry and news outlets are taking steps to try to head off future hacks.
For example, Twitter is moving toward a two-step authentication process as a way to improve security, according to Wired. Anytime a user tweets from a new device, the user would need to input a random code messaged to their cellphone.andalready use such a two-step process.
Meanwhile, major news outlets includingandare also approaching the problem from a different direction. They are employing services such as Storyful that quickly verify whether social media posts from other organizations or random users are accurate.
More broadly, newsrooms nationwide are urging reporters to strengthen passwords, to change them more often, and to be more aware of how hackers work.
AP reporter Mike Baker told his Twitter followers that he was a victim of phishing, a tactic in which hackers parading as legitimate entities send e-mails that ask for sensitive information, such as passwords or account numbers.
AP responded to the attack by shutting off all its Twitter accounts until all passwords were checked, which was the right thing to do, says Mr. LaMott. But the damage was done.
The agency has won back many of the Twitter followers it lost, but still the brand name is tarnished, says Ari Zoldan, CEO of Quantum Networks, which specializes in next-generation communication devices. "Fortunately, there are lots of off-the-shelf and easy-to-use systems already out there that people just dont know about yet.
One firm, Dashlane.com, sells password-generating software that takes the onus off of individuals to create and remember an array of names or dates. The firms research shows that the average American has 50 passwords. Hackers know the conventional processes by which users create them birth dates or relatives' or childrens names and have designed algorithms to identify them.
Companies will be sinking millions into this because their very reputations are at stake, says Mr. Zoldan.
Some analysts say the AP episode underlines the new, dangerously interlinked world, and they urge caution.
No matter how much encryption software becomes available, it will never be 100 percent effective, says Mark Tatge, a professor of communication atin ,He thinks companies should stop relying so heavily on cloud technologies that store massive amounts of sensitive data.
"Were putting terabytes and terabytes and terabytes of data where it can be conveniently used from many locations and thats the attraction, he says. Its cheap and efficient but companies have to learn to not put so much information in there if they are going to be devastated when someone gets ahold of it.
Staff writer Gloria Goodale contributed to this report.
RECOMMENDED:Related stories
Sunil Tripathi body found; Brown student was misidentified in Boston bombingBecome a part of the Monitor community
http://doradqom.guildomatic.com/news/show/1400640
http://en.netlog.com/kirbynutting/blog/blogid=21948381
http://mariellaycm.guildomatic.com/news/show/1400645
http://oorupppeh.metroblog.com/downloads_the_do_it_yourself_direct_mail_handbook
http://nosohose.deviantart.com/journal/Download-Houses-Origins-WA-Design-ebook-367056980
http://maxwellhle.jimdo.com/2013/04/21/dig-dogs-dig-a-construction-tail-book/
http://leonidaoie.guildomatic.com/news/show/1400649
http://bisanews.bravesites.com/entries/general/downloads-slammer-book
http://en.netlog.com/dierdrecorliss/blog/blogid=21948395
http://veworump.deviantart.com/journal/Little-Farm-in-the-Foothills-A-Boomer-Couple-s-S-367057022
http://yoxaafro.deviantart.com/journal/Computational-Modelling-Concrete-Stru-e-book-367057028
http://sazawhig.bravesites.com/entries/general/microsoft-sharepoint-designer-2010-step-read-online
http://pdotkeal.metroblog.com/task_rotation_strategies_for_differentiating_activities_and_assessments_e_book
http://twilavaum.jigsy.com/entries/general/hard-pressed-600-years-of-prints-and-process-ebook-downloads
http://lpeubqre.metroblog.com/download_rough_draft_pop_culture_the_way_it_almost_was_ebook
http://romaineqoiy.inube.com/blog/3245772/strong-women-stay-young-e-book/
http://charolettezfey.guildomatic.com/news/show/1400654
http://en.netlog.com/lyndonaugustine/blog/blogid=21948407
http://karlyboe.jigsy.com/entries/general/pimp-the-story-of-my-life-online