The Associated Press's Twitter account was hijacked this afternoon and used to tweet a false message that reported two explosions at the White House had left U.S. President Barack Obama injured. One security expert says the incident underscores the need to adopt out-of-band two-factor authentication and keystroke encryption. American media suffered another black eye Tuesday afternoon when U.S. stock markets briefly went into a tailspin after the Associated Press’s Twitter account was hijacked and used to broadcast this false message: “Breaking: Two Explosions in the White House and Barack Obama is injured.” Bogus tweet sent earlier today from AP’s hijacked Twitter account.In a two-minute span between 1:08 pm EDT and 1:10 pm EDT, just after the fake tweet hit Twitter, the Dow Jones Industrial Average dropped 145 points. The market quickly corrected itself after the Associated Press disclosed that it had been hacked and its Twitter account suspended while it sought to correct the issue. The White House also confirmed that President Obama was “fine.” An organization calling itself the “Syrian Liberation Army” quickly claimed responsibility.According to CBS News, the Associated Press confirmed that the hijacking of its Twitter account was preceded by a phishing attempt on its corporate network. George Waller, executive vice president and co-founder of security specialist StrikeForce Technologies, says the incident calls attention to the need for enterprises to insist upon out-of-band two-factor authentication for remote access users (which includes anyone who accesses Twitter accounts, for example) and keystroke encryption. “Most likely, what happened here is what we’ve seen time and time again: The malware writers are constantly spear phishing for folks like this AP guy,” Waller says. “What reporter out there doesn’t have his email address out there in the public domain? Essentially, with that, they’ll phish you and pass you a piece of malware in an email. It could be a pitch, breaking news, something like that. You’re going to open it up and get infected.” “Most likely, they infected that person’s machine with a keylogger and they watched and got his Twitter account when he logged in,” he added. Protection Requires 2-Factor Authentication and Keystroke EncryptionProtecting yourself and your organization requires two things, Waller says. First, you must use out-of-band two-factor authentication. In other words, when someone initiates a login, completing the login process requires entering a one-time password sent to the individual over a different channel—a text message on a mobile device, for example. But even that is not enough, Waller says. “If I put a keylogger on your system and you have out-of-band two-factor authentication, I may not be able to crack your password, but I can still watch everything you write,” Waller says. Because of that, the second essential component is keystroke encryption. “Everyone needs to encrypt every stroke,” Waller says. “Most likely if the AP reporter had keystroke encryption, he wouldn’t have had that breach. The only way to protect real, live data in motion is you’ve got to encrypt every keystroke at the point of origin.” “In the past three years, if the world had out-of-band authentication and keystroke encryption on everyone’s computer, probably greater than 95 percent of corporate data breaches and identity theft cases would have been prevented,” Waller adds.Thor Olavsrud covers IT Security, Big Data, Open Source, Microsoft Tools and Servers for CIO.com. Follow Thor on Twitter @ThorOlavsrud. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Thor at tolavsrud@cio.com Related content BrandPost Retail innovation playbook: Fast, economical transformation on Microsoft Cloud For retailers, tight integration of data and systems is the antidote to a challenging economy. By Tata Consultancy Services Mar 24, 2023 3 mins Retail Industry Digital Transformation BrandPost How retailers are empowering business transformation with TCS and Microsoft Cloud AI-powered omnichannel integration and a strong, secure digital core lets retailers innovate across four primary areas while staying compliant, maintaining security and preventing fraud. By Tata Consultancy Services Mar 24, 2023 4 mins Retail Industry Cloud Computing BrandPost How to Build ROI from Cloud Migration This whitepaper and webcast can help you calculate the ROI and create a business case for modernizing your legacy applications to the Microsoft Cloud. By Tata Consultancy Services Mar 24, 2023 1 min Retail Industry Cloud Computing BrandPost How to power a sustainable enterprise on Microsoft Cloud In this eBook, we’ll follow the journey of Amal Skye, a fictitious woman who is committed to living in a way that preserves the planet for the future —and how businesses like Tata Consultancy Services and Microsoft are making that possi By Tata Consultancy Services Mar 24, 2023 1 min Retail Industry Green IT Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe