Lessons learnt from high profile security breaches

02.10.2012

" Twitter: Having Gmail account access yields access to Honan's Twitter account (via, you guessed it, password recovery again) that allowed the posting of hate speech.

" The attacker finally deleted Honan's Gmail account including all its contents.

Honan's personal electronic devices were wiped, all his personal emails were deleted and his name associated with hate speech on his Twitter account.

How did we get from a simple 'whois' lookup for a billing address to that? The answer... one tiny step at a time.

You can see that each step above relies on 'having' access to one piece of information to 'yield' another. The trick is to ensure that you are yielded something a little more important each time.