Security

02:13 PM
Becca Lipman
Becca Lipman
Slideshows
Connect Directly
Facebook
Google+
Twitter
RSS
E-Mail
50%
50%

7 Unusual Behaviors That Indicate Security Breaches

Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.
Previous
2 of 7
Next


104,338 tweets from 1 day from 1 IP address. In this instance, a bot was exfiltrating data from a bank 140 characters at a time.

One bank was taken aback by the discovery of malware sending out sensitive information through Twitter - 140 characters at a time. The account was created as a window to send tweets to a machine that presumably stitched the information together. To anyone following the account, it would have looked like gibberish.

In this instance no employees were out of line, and the malware was responding to outside forces.

 

Becca Lipman is Senior Editor for Wall Street & Technology. She writes in-depth news articles with a focus on big data and compliance in the capital markets. She regularly meets with information technology leaders and innovators and writes about cloud computing, datacenters, ... View Full Bio

Previous
2 of 7
Next
Register for Wall Street & Technology Newsletters
Video