Home Forums Members Forum Twitter hack is another wake-up call about security ahead of the election

  • This topic is empty.
Viewing 1 post (of 1 total)
  • Author
  • #5386 Reply

    id=”article-body” class=”row” section=”article-body”>

    <i><u> <div class=”col-1 spacer”></div></u></i>

    <u> <div class=”col-7 article-main-body row ” data-component=”lazyloadImages”></u>

    <figure class=”image image-large pull-none hasCaption shortcode” section=”shortcodeImage”><span class=”imageContainer”><span>twitter-logo-american-flag-9764</span></span><figcaption><span class=”caption”><p>Disinformation is a top concern ahead of this year’s US presidential election.</p></span><span class=”credit”>
    Angela Lang/CNET

    <p class=”speakableTextP1″>A <span class=”link” section=”shortcodeLink”>Twitter hack</span> earlier this week underscored an unnerving truth: Even the accounts of some of America’s most high-profile politicians aren’t secure.</p><p class=”speakableTextP2″>On Wednesday, a tweet from the account of Joe Biden, the presumptive Democratic presidential nominee, offered to double the amount of Bitcoin sent to a particular address. Biden was “giving back to the community” through the cryptocurrency, the tweet said. Similar tweets were sent from the accounts of former President Barack Obama and ex-New York City mayor and onetime presidential candidate Mike Bloomberg. The account of rapper Kanye West, who has flirted with the idea of running for president, also made the offer.</p>

    <div class=”c-reengageNewsletter shortcode hasNewsletter newsletter-subscribe-form desktop ” data-component=”newsletterAndInterest” data-newsletter-and-interest-options='”id”:”7bccd49e-819e-4822-a96e-0c2850b2d036_CNET_CAT_TOPIC”,”name”:”Politics”,”type”:”specific”,”noNotificationText”:”Subscribe to the Politics newsletter and see related stories on CNET.”‘>
    <h5>For more like this</h5>
    <div class=”c-reengageNewsletter_dek” data-reengage-dek=”null”>Subscribe to the CNET Now newsletter for our editors’ picks of the most important stories of the day.</div>
    <div data-component=”lazyloadElement” data-lazyload-element-options='”attribute”:null,”loadOnCreate”:true,”src”:”\/email\/newsletter\/1013556\/?withInterest=true&interestName=Politics&isAuto=0&ecode=e404″,”tracking”:”reengage-nl-imp-1013556-1362879″‘></div>
    <p>Politicians weren’t the only targets in what turned into a long afternoon for <span class=”link” section=”shortcodeLink”>Twitter</span> as it melted down under the attack. The accounts of Apple, Tesla CEO Elon Musk, Amazon CEO Jeff Bezos and Microsoft founder Bill Gates were also hijacked. The attack was widespread and caught Twitter flat-footed. The hackers showed that bypassing security measures wasn’t hypothetical. They’d done it and were in control of the voices of people who can sway opinion during the presidential election season. </p><figure class=”image image-medium pull-right hasCaption shortcode” section=”shortcodeImage”><span class=”imageContainer”>joe-biden.png<noscript>joe-biden.png</noscript></span><figcaption><span class=”caption”><p>On Wednesday, the Twitter account of presumptive Democratic presidential nominee Joe Biden was compromised and pushed a cryptocurrency scam. CNET has blocked out the address that hackers included in the tweet.</p></span><span class=”credit”>
    Screenshot by Queenie Wong/CNET
    </span></figcaption></figure><p>The brazen hack and Twitter’s chaotic response have prompted concern among politicians, cybersecurity experts and everyday users of Twitter that social media sites can’t adequately secure their operations even as they become increasingly important in election news and information. Election security has been a top concern for tech companies since Russian trolls used social media posts and ads on Facebook and Twitter to sow discord among Americans during the <span class=”link” section=”shortcodeLink”>2016 US presidential election</span>. With disinformation already a major worry, the Twitter hack means social media users should now be even more wary about what they read online.</p><p>Politicians have long used technology, including social media, to broadcast messages to the public. Tweets by politicians are considered newsworthy and often reported by media outlets, furthering their reach. President Donald Trump has used Twitter to warn about <span class=”link” section=”shortcodeLink”>military action against Iran</span>, 더나인카지노 criticize the media and his Democratic rivals and broadcast his views on hot-button topics such as Russia, North Korea, tariffs and foreign policy. The president, who has more than 83 million followers, has also come under fire for using Twitter to spread <span class=”link” section=”shortcodeLink”>misinformation about mail-in ballots</span> and has been accused of <span class=”link” section=”shortcodeLink”>inciting violence</span> during the recent protests for racial justice. </p><p>Joan Donovan, research director at the Shorenstein Center on Media, Politics and Public Policy at Harvard University, said Wednesday’s hack should shake everyone’s faith in messages that come out of Twitter. Tweets have to be verified independently, especially when coming from high-profile accounts. Otherwise, hackers could step in and ramp up international conflict or spread disinformation at a time of crisis.</p><p>”I don’t understand how anybody could believe anything coming out of Twitter at this point,” Donovan said. “Everything should be questioned.”</p><p>In some ways, Twitter was lucky that hackers tweeted out nothing more than a simple crypto scam. The hackers didn’t gain control of Trump’s account, which reportedly has an extra layer of protection after a Twitter worker briefly deactivated it in 2017. Twitter declined to comment about Trump’s account security, but a spokesman said the investigation is ongoing and they’ll share updates through @TwitterSupport.</p><figure class=”media-source”>
    <div class=”twitterContainer”>

    <p lang=”en” dir=”ltr”>We detected what we believe to be a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.</p>— Twitter Support (@TwitterSupport) July 16, 2020

    <u><i> </div></i></u>

    <script type=”text/plain” class=”optanon-category-5″ id=”script_twitterwidget” src=”//platform.twitter.com/widgets.js” async></script>

    <u> <script type=”text/plain” class=”optanon-category-5″></u>
    window.CnetFunctions.logWithLabel(‘%c One Trust ‘, “Service loaded: script_twitterwidget with class optanon-category-5″);

    <u><b> </figure></b></u>
    <p>Twitter’s response to the hack didn’t satisfy lawmakers.</p><p>”I’m extremely troubled by this hack of Twitter accounts,” US Sen. Edward Markey, a Massachusetts Democrat, said in a statement Thursday. “While this scheme appears financially motivated and, as a result, presents a threat to Twitter users, imagine if these bad actors had a different intent to use powerful voices to spread disinformation to potentially interfere with our elections, disrupt the stock market, or upset our international relations.”</p><p>On Wednesday night, Twitter said the hackers successfully targeted employees who had access to its internal systems and tools in what it believes to be a “coordinated social engineering attack.” The company declined to provide further detail about how this happened and whether the employees were somehow tricked or bribed into handing over access to user accounts. </p><p>Twitter said it’s also looking into other “malicious activity” the hackers may have engaged in and what information they may have accessed. The company said it has no evidence that the hackers accessed passwords. Twitter said Thursday night that attackers targeted about 130 accounts but were only able to control a “small subset” of the accounts. The company also said it was taking “aggressive steps” to secure its system but didn’t specify what they are. The FBI is leading an inquiry into the Twitter hack, Reuters reported, citing two anonymous sources.</p><div class=”shortcode related-links float_left ” section=”shortcodeRelatedLinks” data-track=”linkstack”>
    <span>More on cybersecurity</span>


    <p>In a statement, the FBI office in San Francisco confirmed it’s investigating the incident. “At this time, the accounts appear to have been compromised in order to perpetuate cryptocurrency fraud,” the agency said in its statement. “We advise the public not to fall victim to this scam by sending cryptocurrency or money in relation to this incident. As this investigation is ongoing, we will not be making further comment at this time.”</p><p>Douglas Schmidt, a professor of computer science and engineering at Vanderbilt University, said the hackers could still do damage, such as blackmailing or ransoming the owners, if any of the affected accounts had been used to share sensitive information through direct messages. Twitter’s direct messages aren’t end-to-end encrypted, which would’ve prevented employees from reading messages on these high-profile accounts. The loss to Twitter’s reputation is “monumental,” Schmidt said and the hackers appear to have netted more than $113,500 from the scam.</p><p>”Twitter is not unlike so many other companies that just don’t have their act together with respect to cybersecurity in a world of changing threats,” Schmidt said. “This is just a microcosm of the world we live in today and we all have to up our game.”</p><h2>Another red flag for consumers and social media</h2><p>The attack on Twitter’s internal systems is a warning to tech users everywhere, said Roger Grimes, a security expert at KnowBe4, a company that trains employees not to fall for social engineering attacks like the one that seems to have struck Twitter.</p><p>Many of the high-profile accounts targeted Wednesday were likely locked down with strong passwords and two-factor authentication, which requires an extra step before logging in. But those security measures failed to protect the accounts, because the hackers appear to have bypassed the login process.</p><p>Social engineering attacks are designed to trick people into giving hackers access to accounts, either by giving up passwords or running malicious software unwittingly. Hackers often create a false sense of crisis by telling targets there’s suspicious activity on an account, or sm카지노 some other distracting and stressful event that makes them willing to do things they normally wouldn’t.</p><p>There are technical measures Twitter and other social media companies could take to prevent attacks like this in future, including making sure no single administrator has the power to update user accounts without approval from someone else. But there’s always the opportunity to get around those measures by fooling people, Grimes said.</p><p>”The bigger problem is not technology,” he said, “but the human factor.”</p><p>Twitter has more than 5,100 employees worldwide.</p><p>Social media users not only have to be more skeptical about what they read online, they should also be wary about sharing any information online that they don’t want leaked in a hack. As more people turn to social media sites during the coronavirus pandemic, that’s easier said than done because we’re more reliant than ever on technology.</p><p>”We just have to keep reminding ourselves that these things that seem safe and secure are not under our control at all,” Schmidt said. “People halfway around the world in a cybercafe can wreak enormous damage on your reputation, finances and your business in ways that are very hard to recover from, in a blink of an eye.”</p><h2>A track record of vulnerabilities</h2><p>Hacking into high-profile social media accounts is rare, but it’s happened on Twitter multiple times. Those earlier attacks show that hackers have a variety of methods for hijacking accounts. </p><p>Last year, hackers took control of  ‘s account to tweet out sexist, racist and anti-Semitic comments. The company placed blame for the takeover on a security issue with Dorsey’s mobile provider that allowed the hackers to compose and send tweets from his account via text message. The attack is believed to have been conducted through SIM swapping, an exploit involving a hacker who convinces an employee of a mobile provider, sometimes through bribes, to switch the numbers tied to the SIM card. The switch allows the hacker to bypass security measures, such as two-factor authentication. In April 2020, Twitter turned off the ability to receive tweets via text message in most countries. </p><p>Hackers have also hijacked accounts by exploiting third-party services that use Twitter data. In 2018, hackers  to tweet out a cryptocurrency scam. In that attack, hackers breached a third-party marketing service, not Twitter’s own system, to tweet out cryptocurrency ads, the social network said. </p><p>This year, the <span class=”link” section=”shortcodeLink”>Twitter accounts</span> of several NFL teams, including the Green Bay Packers, Chicago Bears, Dallas Cowboys and San Francisco 49ers, were hacked ahead of the Super Bowl. OurMine, the Saudi Arabia-based hacker group, said it was responsible for the hack and posted tweets that said “We are here to show people that everything is hackable.” Twitter attributed the security incident to an issue with a third-party publishing tool. Some teams were also hacked on Facebook and its photo-service Instagram. </p><p>Twitter’s own workers have also been involved in security blunders. </p><p>In 2017, Bahtiyar Duysak, a contractor for Twitter, briefly deactivated Trump’s account. Duysak, who worked in customer support as part of Twitter’s Trust and Safety division, described the incident to TechCrunch as a “mistake.” On his last day of work, he said someone had reported Trump’s account and he started the process to deactivate it, but he never thought it would actually happen, because the president’s tweets are considered newsworthy.</p><p>Last year, the US Justice Department charged two former  with spying for Saudi Arabia by accessing the personal information of thousands of Twitter users. </p><p>Meanwhile, Biden’s campaign is keeping in touch with Twitter about the security incident. In a tweet Thursday, Biden urged his followers to donate to his campaign but he also made one thing clear. </p><p>”I don’t have Bitcoin,” Biden tweeted, “and I’ll never ask you to send me any.” </p>

    <u><i> <footer class=”row c-foot”></i></u>
    <div class=”col-3 c-foot_seg”>

    <div class=”comment-container” data-component=”sharebar” data-sharebar-options='”title”:”Twitter hack is another wake-up call about security ahead of the election”,”description”:”The Twitter accounts of high-profile politicians were caught up in a massive hack.website
    <div class=”share-button sharebarRedesignButton comment-count-redesign” data-conversation-id=”05eefcda-b289-4be9-b84c-22d9742531f1″>

    <div class=”button button_type_primary button_size_medium “>
    <span class=”button__icon”>
    <span class=”button__iconText” data-item=”iconText”> </span><svg class=” comments”>
    <use aria-hidden=”false” xlink:href=”#comments”></use>

    <u> </span><span data-item=”buttonText”>Comments</span></u>

    <b> </b>
    </div> </div>

    <u><b> <div class=”col-4 c-foot_seg”></b></u>

    <u><div class=”row tagList desktop” section=”tag”></u>

    <u><i> CNET Apps Today</i></u>


    <u> Twitter</u>

    <b> </b>

    <b> <span class=”interestContainer”></b>
    <span class=”followInterestButton nonFollowedInterest hidden add” data-component=”interest” data-interest-options='”id”:”7bccd49e-819e-4822-a96e-0c2850b2d036_CNET_CAT_TOPIC”,”name”:”Politics”,”type”:”specific”‘>
    <span class=”bell”>
    <span class=”activated”>
    <svg class=” notification-activated”>
    <use aria-hidden=”false” xlink:href=”#notification-activated”></use>

    <b> </span></b>
    <span class=”default”>
    <svg class=” notification”>
    <use aria-hidden=”false” xlink:href=”#notification”></use>

    <u><i> </span></i></u>
    <div class=”tooltip interestBanner”>
    <div class=”on”>Notification on</div>
    <div class=”off”>Notification off</div>
    <span class=”text”>Politics</span>

    </div> </div>
    </footer> </div>

    <u><b> <div class=”col-4″ section=”rColumn”></b></u>

    <b> <div data-video-player=”container” class=””></b>
    <div class=”inviewElement dock entered” data-component=”inviewElement” data-inview-element-options='”events”:[“entered”],”repeat”:false’>
    <div class=”upnext hidden” data-video-info=”upnext”></div>
    <svg class=”svg-symbol playerControls”><symbol id=”play” viewbox=”0 0 26.6 32″><path d=”M0,2.6c0-2.4,1.6-3.3,3.7-2L25,13.7c2,1.3,2,3.2,0,4.5L3.7,31.4c-2,1.3-3.7,0.3-3.7-2C0,29.4,0,2.6,0,2.6z”></path></symbol><symbol id=”pause” viewbox=”0 0 26.6 32″><g><polygon points=”16,32 26.5,32 26.5,8.8 26.5,0 16,0″></polygon><rect x=”0.1″ y=”0″ width=”10.6″ height=”32″></rect></g></symbol><symbol id=”playlist” viewbox=”0 0 32 22.9″><g><circle class=”st11″ cx=”2.3″ cy=”20.6″ r=”2.3″></circle><circle class=”st11″ cx=”2.3″ cy=”11.4″ r=”2.3″></circle><circle class=”st11″ cx=”2.3″ cy=”2.3″ r=”2.3″></circle><path class=”st11″ d=”M32,1.1C32,0.5,31.5,0,30.9,0H10.3C9.7,0,9.1,0.5,9.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V1.1z”></path><path class=”st11″ d=”M32,10.3c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V10.3z”></path><path class=”st11″ d=”M32,19.4c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V19.4z”></path></g></symbol><symbol id=”speaker-on” viewbox=”0 0 32 28.1″><g><g><path d=”M12.6,5L6.3,8.7H0.6C0.3,8.7,0,9,0,9.3V19c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V6.5C14.2,4.8,13.9,4.2,12.6,5z”></path></g><path d=”M18,23.1v-2.8c2.6,0,4.7-2.8,4.7-6.2S20.6,7.8,18,7.8V5c4.2,0,7.5,4,7.5,9S22.1,23.1,18,23.1z”></path><path d=”M21.3,28.1v-2.8c4.4,0,7.9-5,7.9-11.2S25.6,2.8,21.3,2.8V0C27.2,0,32,6.3,32,14C32,21.8,27.2,28.1,21.3,28.1z”></path></g></symbol><symbol id=”speaker-off” viewbox=”0 0 32 18.8″><g><g><path d=”M12.6,0.4L6.3,4H0.6C0.3,4,0,4.3,0,4.7v9.7c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V1.8C14.2,0.2,13.9-0.5,12.6,0.4z”></path></g><polygon points=”32,4.5 30.2,2.7 25.3,7.6 20.4,2.7 18.6,4.5 23.5,9.4 18.6,14.3 20.4,16.1 25.3,11.2 30.2,16.1 32,14.3 27.1,9.4 “></polygon></g></symbol><symbol id=”captions” viewbox=”0 0 32 16.2″><g><path d=”M8.6,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6C0.2,10.4,0,9.3,0,8.1c0-1.2,0.2-2.3,0.7-3.3s1-1.8,1.8-2.6C3.2,1.5,4.1,1,5.2,0.6S7.4,0,8.6,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5c0.4,0.5,0.7,1.1,0.9,1.6l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9C11,5.3,10.8,5,10.5,4.8c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2C8,4.2,7.5,4.3,7,4.5C6.6,4.7,6.2,5,5.8,5.3C5.5,5.7,5.2,6.1,5.1,6.5C4.9,7,4.8,7.5,4.8,8.1c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8C7.5,11.9,8,12,8.6,12c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C10.5,16,9.6,16.2,8.6,16.2z”></path><path d=”M24.9,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6c-0.4-1-0.7-2.1-0.7-3.3c0-1.2,0.2-2.3,0.7-3.3c0.4-1,1-1.8,1.8-2.6c0.8-0.7,1.7-1.3,2.7-1.7C22.6,0.2,23.7,0,24.9,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5C31.5,3.5,31.8,4,32,4.5l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9c-0.2-0.3-0.4-0.5-0.7-0.7c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2c-0.6,0-1.1,0.1-1.5,0.3c-0.5,0.2-0.9,0.5-1.2,0.8c-0.3,0.4-0.6,0.8-0.8,1.2c-0.2,0.5-0.3,1-0.3,1.5c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8c0.5,0.2,1,0.3,1.5,0.3c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C26.8,16,25.9,16.2,24.9,16.2z”></path></g></symbol><symbol id=”share” viewbox=”0 0 32 20″><path d=”M20,6c0,0-7.9-0.1-13.2,3.3C1.6,12.7,0,20,0,20s5.1-5.4,9.8-7.2C14.9,10.9,20,12,20,12v6l12-8L20,0V6z”></path></symbol><symbol id=”fullscreen” viewbox=”0 0 32 32″><g><g><polygon class=”st11″ points=”11.4,0 0,0 0,11.4 3.4,8 9.1,13.7 13.7,9.1 8,3.4 “></polygon></g><g><polygon class=”st11” points=”20.6,32 32,32 32,20.6 28.6,24 22.9,18.3 18.3,22.9 24,28.6 “></polygon></g><g><polygon class=”st11” points=”32,11.4 32,0 20.6,0 24,3.4 18.3,9.1 22.9,13.7 28.6,8 “></polygon></g><g><polygon class=”st11” points=”0,20.6 0,32 11.4,32 8,28.6 13.7,22.9 9.1,18.3 3.4,24 “></polygon></g></g></symbol><symbol id=”video” viewbox=”0 0 32 22″><g><path d=”M29,2.2c-0.7,0.2-4.6,3-7.9,5.3V2.1C21.1,1,20.1,0,19,0H2.1C1,0,0,1,0,2.1v17.7C0,21,1,22,2.1,22H19c1.2,0,2.1-1,2.1-2.1v-5.9c3.3,2.4,7.4,5.4,8.2,5.6c1.4,0.4,2.7-0.1,2.7-0.1V2.2C32,2.2,30.1,1.8,29,2.2z”></path></g></symbol></svg>

    <div class=”videoPlayer ” data-component=”videoPlayer” data-video-player-options='”config”:”policies”:”default”:11417438,”tracking”:”can_partner_id”:”canPartnerID”,”comscore_id”:”3000085″,”comscore_home”:”3000085″,”comscore_how_to”:”3000078″,”comscore_news”:”3000078″,”comscore_reviews”:”3000087″,”comscore_videos”:”3000088″,”comscore_sense_id”:”cnetvideo”,”comscore_sense_home”:”cnethome”,”comscore_sense_how_to”:”cnethowto”,”comscore_sense_news”:”cnetnews”,”comscore_sense_reviews”:”cnetreviews”,”comscore_sense_videos”:”cnetvideo”,”nielsen_cid”:”us-200330″,”nielsen_vcid”:”c07″,”nielsen_vcid_reviews”:”c05″,”nielsen_vcid_home”:”c07″,”nielsen_vcid_news”:”c08″,”nielsen_vcid_how_to”:”c09″,”nielsen_vcid_videos”:”c20″,”uvpConfig”:”mpx_account”:”kYEXFC”,”playlist”:[],”customCSS”:”https:\/\/cnet4.cbsistatic.com\/fly\/css\/video\/common\/uvpjsDefaults-d41d8cd98f-rev.css”,”eventChannels”:[“videoPlayer”],”eventSubscriptions”:”howlerAudioPlayer”:”playAudio”:”pause”,”audioLoaded”:”setAutoplayToPause”,”apeList”:true,”autoplay”:false,”contentType”:”vod-auto”,”getShortcodeVideo”:0,”getRecommendedPlaylist”:true,”getRelatedPlaylist”:false,”mainPlayer”:true,”suppressAds”:false,”loop”:true,”scrollIntoView”:false’>

    <b> </div></b>

    <b> </div></b>

    <div class=”stickyColumn” data-component=”stickyColumn” data-sticky-column-options='”offset”:0,”selectorHeightConstraint”:”article”,”enableWaypoints”:false’>

    <b> <div class=”stickyColumnElement” data-meta='”height”:620,”type”:”required”‘></b>

    <div data-ad=”mpu-plus-top” data-ad-container=”5f152e68f36d6″ class=”ad-mpu-plus-top ad-slot “>

    <b> </div></b>

    <div class=”stickyColumnElement” data-meta='”height”:300,”type”:”required”‘>

    <div data-ad=”native-mpu-middle” data-ad-container=”5f152e68f36d6″ class=”ad-native-mpu-middle ad-slot “>

    <u> </div></u>

    <div class=”stickyColumnElement” data-meta='”height”:300,”type”:”required”‘>

    <div data-ad=”mpu-bottom” data-ad-container=”5f152e68f36d6″ class=”ad-mpu-bottom ad-slot “>

    <b> </div></b>

Viewing 1 post (of 1 total)
Reply To: Twitter hack is another wake-up call about security ahead of the election
Your information:

Skip to content