{"id":41025,"date":"2020-11-17T09:37:26","date_gmt":"2020-11-17T04:37:26","guid":{"rendered":"http:\/\/story-2326112"},"modified":"2020-11-17T09:37:26","modified_gmt":"2020-11-17T04:37:26","slug":"twitter-appoints-top-hacker-peiter-zatko-aka-mudge-as-head-of-security","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/twitter-appoints-top-hacker-peiter-zatko-aka-mudge-as-head-of-security\/","title":{"rendered":"Twitter Appoints Top Hacker Peiter Zatko, Aka Mudge, as Head of Security"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.gadgets360cdn.com\/large\/pieter_zatko_twitter_1605588860750.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Social media giant Twitter, under increased threat of regulation and plagued by serious security breaches, is appointing one of the world&#8217;s best-regarded hackers to tackle everything from engineering missteps to misinformation.<\/p>\n<p>The company on Monday named Peiter Zatko, widely known by his hacker handle Mudge, to the new position of head of security, giving him a broad mandate to recommend changes in structure and practices. Zatko answers to CEO <a href=\"https:\/\/gadgets.ndtv.com\/tags\/jack-dorsey\" target=\"_self\" rel=\"noopener noreferrer\">Jack Dorsey<\/a> and is expected to take over management of key security functions after a 45- to 60-day review.<\/p>\n<p>In an exclusive interview, Zatko said he will examine &#8220;information security, site integrity, physical security, platform integrity,&nbsp;which starts to touch on abuse and manipulation of the platform,&nbsp;and engineering.&#8221;<\/p>\n<p>Zatko most recently oversaw security at the electronic payments unicorn <a href=\"https:\/\/gadgets.ndtv.com\/tags\/stripe\" target=\"_self\" rel=\"noopener noreferrer\">Stripe<\/a>. Before that, he worked on special projects at <a href=\"https:\/\/gadgets.ndtv.com\/google\" target=\"_self\" rel=\"noopener noreferrer\">Google<\/a> and oversaw handing out grants for projects on <a href=\"https:\/\/gadgets.ndtv.com\/tags\/cyber-security\" target=\"_self\" rel=\"noopener noreferrer\">cyber-security<\/a> at the <a href=\"https:\/\/gadgets.ndtv.com\/tags\/pentagon\" target=\"_self\" rel=\"noopener noreferrer\">Pentagon&#8217;s<\/a> famed Defense Advanced Research and Projects Agency (<a href=\"https:\/\/gadgets.ndtv.com\/tags\/darpa\" target=\"_self\" rel=\"noopener noreferrer\">DARPA<\/a>).<\/p>\n<p>Zatko&#8217;s colorful career began in the 1990s, when he simultaneously conducted classified work for a government contractor and was among the leaders of Cult of the Dead Cow, a hacking group notorious for releasing <a href=\"https:\/\/gadgets.ndtv.com\/tags\/windows\" target=\"_self\" rel=\"noopener noreferrer\">Windows<\/a> hacking tools in order to goad Microsoft into improving security.<\/p>\n<p>&#8220;I don&#8217;t know if anyone can fix <a href=\"https:\/\/gadgets.ndtv.com\/tags\/twitter\" target=\"_self\" rel=\"noopener noreferrer\">Twitter&#8217;s<\/a> security, but he&#8217;d be at the top of my list,&#8221; said Dan Kaufman, who supervised Zatko at DARPA and now leads the advanced products group at Google.<\/p>\n<p>Twitter faces numerous security challenges. A year ago, the US&nbsp;government accused two men of spying for Saudi Arabia when they worked at Twitter years earlier, saying that they passed along private information about the kingdom&#8217;s critics.<\/p>\n<p>In July, a group of young hackers tricked employees and won access to internal tools, which let them change account settings and then <a href=\"https:\/\/www.gadgetsnow.com\/tech-news\/twitter-accounts-of-apple-bill-gates-elon-musk-jeff-bezos-hacked\/articleshow\/76991239.cms\" target=\"_blank\" rel=\"noopener noreferrer\">tweet from the accounts<\/a> of then-presidential candidate <a href=\"https:\/\/gadgets.ndtv.com\/tags\/joe-biden\" target=\"_self\" rel=\"noopener noreferrer\">Joe Biden<\/a>, <a href=\"https:\/\/gadgets.ndtv.com\/microsoft\" target=\"_self\" rel=\"noopener noreferrer\">Microsoft<\/a> founder <a href=\"https:\/\/gadgets.ndtv.com\/tags\/bill-gates\" target=\"_self\" rel=\"noopener noreferrer\">Bill Gates<\/a> and <a href=\"https:\/\/gadgets.ndtv.com\/tags\/tesla\" target=\"_self\" rel=\"noopener noreferrer\">Tesla<\/a> Chief Executive <a href=\"https:\/\/gadgets.ndtv.com\/tags\/elon-musk\" target=\"_self\" rel=\"noopener noreferrer\">Elon Musk<\/a>.&nbsp;<\/p>\n<p>&#8220;The data breach this summer was an important reminder of how far Twitter needs to go in building some of the basic security functions necessary to run a service targeted by adversaries much more skilled than the teenagers arrested for that incident,&#8221; said Alex Stamos, a former Facebook chief security officer and current Stanford researcher who has helped lead efforts to fight election disinformation.<\/p>\n<p>Stamos, who once worked for Zatko&#8217;s security consultancy, called him a great fit for a company lacking the financial muscle of Facebook and Google. &#8220;They are going to have to find creative solutions to these problems, and if Mudge is famous for anything in security, it is being creative.&#8221;<\/p>\n<p>Zatko said he was committed to improving public conversations on Twitter. He praised a recent move to increase &#8220;friction&#8221; by prompting users to comment instead of simply retweeting; a next step could be to force people to understand a long conversation before participating in it, he said.<\/p>\n<p>Zatko said he appreciated Twitter&#8217;s openness to unconventional security approaches, such as his proposal for confusing bad actors by manipulating the data they receive from Twitter about how people interact with their posts.<\/p>\n<p>&#8220;They are willing to take some risks,&#8221; Zatko said of his new employer. &#8220;With the challenges of algorithms and algorithmic bias, they are not standing by and waiting until someone else solves the problem.&#8221;<\/p>\n<p><em>\u00a9 Thomson Reuters 2020<\/em><\/p>\n<hr>\n<p><em>Will Apple Silicon Lead to Affordable MacBooks in India? We discussed this on <a href=\"https:\/\/gadgets.ndtv.com\/tags\/orbital\">Orbital<\/a>, our weekly technology podcast, which you can subscribe to via <a href=\"https:\/\/itunes.apple.com\/in\/podcast\/orbital-gadgets-360-podcast\/id1121036073\">Apple Podcasts<\/a>, <a href=\"https:\/\/podcasts.google.com\/feed\/aHR0cHM6Ly9jZG4uZ2FkZ2V0czM2MC5jb20vY29udGVudC9kYXRhL3htbC9vcmJpdGFsLnhtbA?ved=2ahUKEwitkv778qvqAhW7-zgGHQpjDv8Q4aUDegQIARAC&amp;hl=en-IN\">Google Podcasts<\/a>, or <a href=\"https:\/\/feeds.feedburner.com\/TheOrbitalGadgets360\">RSS<\/a>, <a href=\"https:\/\/dts.podtrac.com\/redirect.mp3\/cdn.gadgets360.com\/content\/data\/audio\/orbital245.mp3\">download the episode<\/a>, or just hit the play button below.<\/em><audio controls preload=\"none\"><\/audio><\/p>\n<p><a href=\"https:\/\/gadgets.ndtv.com\/social-networking\/news\/twitter-appoints-hacker-mudge-peiter-zatko-head-of-security-2326112#rss-gadgets-apps\">By Gadgets 360 Source Link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social media giant Twitter, under increased threat of regulation and plagued by serious security breaches, is appointing one of the world&#8217;s best-regarded hackers to tackle everything from engineering missteps to misinformation. The company on Monday named Peiter Zatko, widely known by his hacker handle Mudge, to the new position of head of security, giving him [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14090],"tags":[14129],"class_list":{"0":"post-41025","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-latest-mobile-news-and-updates","7":"tag-social"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/41025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=41025"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/41025\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=41025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=41025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=41025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}