Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Governance

Analysis: Using Twitter for Espionage

Plus: NIST's New Privacy Framework; Business Email Compromise Update
Analysis: Using Twitter for Espionage

The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government.

In this report, you'll hear (click on player beneath image to listen):

  • ISMG's Mathew Schwartz discuss why the U.S. Department of Justice charged three men with infiltrating Twitter on behalf of the Saudi government;
  • ISMG's Eric Chabrow analyze the soon-to-be released National Institute of Standards and Technology privacy framework with Naomi Lefkovitz, NIST's senior cyber policy adviser;
  • David Stubley, CEO of 7 Elements, describe evolving business email compromise attacks.

The ISMG Security Report appears on this and other ISMG websites on Fridays. Don't miss the Oct. 25 and Nov. 1 editions, which respectively discuss Russian hackers hijacking Iranian hacking tools and how to prevent data exposure in the cloud.

Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.