Twitter acquires mobile security firm

Android data encryption and security management software boosts micro-blogging platform defences.

Twitter bird

Twitter confirmed late yesterday it had acquired mobile data encryption and security management software Whisper Systems.

The micro-blogging service has bought the US-based startup for an undisclosed sum to boost its security defences, particularly for mobile delivery over Google's Android operating system (OS).

Whisper Systems was co-founded last year by security developers Stuart Anderson and Moxie Marlinspike, who is also known for his work on secure communications protocols.

Robert Weeks, Twitter spokesman, confirmed in a statement sent to IT Pro that The Whisper Systems team had joined Twitter.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"As part of our fast-growing engineering team, they will be bringing their technology and security expertise to Twitter's products and services. We're happy to have Moxie and Stuart both on board," it said.

Whisper Systems produces security and privacy software applications for managing and encrypting content on mobile devices running the Android OS.

The startup, which was still in beta, offered its WhisperCore 0.5 device and data security management tool for Nexus S and Nexus One phones, WhisperMonitor 0.1 firewall software, and Flashback 0.1, RedPhone 0.4 and TextSecure 0.5 for encrypted backups, voice calls and texts.

The company said yesterday that its goal is improving security and privacy for mobile devices.

This led it to develop a full software stack, "all the way from application-level solutions at the top of the stack, down through a hardened version of Android, to kernel modifications at the bottom of the stack".

"Now that we're joining Twitter, we're looking forward to bringing our technology and our expertise into Twitter's products and services," it added.

Advertisement - Article continues below

With over 100 million users, the social networking site has been in the news over security before, where either its users have been targeted with malware and phishing scams, or its use during civil unrest has made the subject of national cyber security concerns.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/analytics/30201/how-to-use-twitter-analytics-start-sharing-like-the-pros
analytics

How to use Twitter analytics: start sharing like the pros

21 Feb 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/security/cyber-security/354468/if-not-passwords-then-what
cyber security

If not passwords then what?

8 Jan 2020
Visit/policy-legislation/31772/gdpr-and-brexit-how-will-one-affect-the-other
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020