Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Governance & Risk Management
Analysis: Using Twitter for Espionage
Plus: NIST's New Privacy Framework; Business Email Compromise UpdateThe latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government.
In this report, you'll hear (click on player beneath image to listen):
- ISMG's Mathew Schwartz discuss why the U.S. Department of Justice charged three men with infiltrating Twitter on behalf of the Saudi government;
- ISMG's Eric Chabrow analyze the soon-to-be released National Institute of Standards and Technology privacy framework with Naomi Lefkovitz, NIST's senior cyber policy adviser;
- David Stubley, CEO of 7 Elements, describe evolving business email compromise attacks.
The ISMG Security Report appears on this and other ISMG websites on Fridays. Don't miss the Oct. 25 and Nov. 1 editions, which respectively discuss Russian hackers hijacking Iranian hacking tools and how to prevent data exposure in the cloud.
Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.