Twitter outage spotlights 'addiction to social media crack'
Attack that hit Twitter, Facebook and Google left users adrift
Computerworld - The attack that knocked Twitter offline and slowed access to Facebook Thursday morning offered a quick lesson in how dependent millions of people have become on social networking sites.
A distributed denial-of-service (DDoS) attack took the microblogging site Twitter offline for about two hours yesterday morning. The same attack also hit Facebook and a few Google sites, but they didn't collapse as Twitter did. Facebook reported a slowdown and a spokesman for Google said that while Google search, Gmail and docs were unaffected, some users experienced problems with custom URL redirects in both the Google Blogger and the Google Sites wiki.
While security experts today are working to figure out who was behind the widespread attack, other analysts are calculating the effect the downtime had on social networking users.
While the level of damage varied from site to site, the online uproar over the attacks was palpable. When users couldn't get on Twitter, a lot of them immediately went to their Facebook pages to vent their frustrations about not being able to Twitter.
And the slow connections they suffered there just increased their frustrations.
"It was kind of shocking. It was a lights-out kind of moment," said Erik Qualman, author of Socialnomics and a blog of the same name. "Yesterday showed that people are addicted...to the social media crack. You shut this thing down and it shows you, by the way people reacted, that there's been a fundamental shift in the way people communicate. People have carved out time in their day, their hours, for this."
When Twitter went offline yesterday, 45 million users -- including a growing number of older users -- were affected. And they were vocal about their feelings about it. One Facebook user noted, "Suffering tweet withdrawal." Another posted, "Wanting Twitter - NOW."
Qualman said he's actually a bit happy that social networking hiccuped yesterday. Now, it'll be easier for him to explain to people just how important sites like Facebook and Twitter have become.
"Maybe it illuminates naysayers who think it's a fad with people talking about their cat rolling over," he added. "Hopefully, people will see that people are up in arms about this and that it's bigger than [they] thought.... If it had gone down and there was no news about it, then it would have shown that people don't care."
- Tweets about Ferguson, Mo., shooting show Twitter's quick grip on the news
- 5 Twitter clients for Linux
- Twitter brings the data back in-house with Gnip buy
- Twitter crashed -- again -- on Tuesday
- Twitter's slipping user growth spooks investors
- Get ready to tweet your questions for Twitter's first earnings call
- Super Bowl sets Twitter record, as Volkswagen launches social war room
- Perspective: Twitter's success opens up IPO pipeline
- Update: Twitter goes public at $45 a share
- With IPO cash influx, Twitter could be bigger threat to Facebook
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts