Twitter Weekly Updates for 2012-06-10
- RT @DeathStarPR Easy way to feel like Darth Vader: stand over a heap of dirty laundry and imagine you've just killed a Jedi. #StarWars #
- RT @runasand We have managed to determine exactly how Ethiopia blocks #Tor and we have developed a workaround: https://t.co/snTjeVbN #
- RT @derekcslater What I learned when I left security http://t.co/AexcK8NN Advice on exec communication – great story, valuable perspectives #
- RT @hellNbak_ @adamshostack @derekcslater anything with Scott Blake has to be worth reading. #
- Imma let you finish @asus, but If you get past how sexist & asinine @asus was, you realize it's so bad it's hard to satirize #
- RT @jeremiahg "Samsung Bug Bounty Program is under maintenance." ooops, did linking to just kill the site? << & will you get bounty? #
- RT @jeremiahg Interesting twist on CloudFlare breach "..involved breach of AT&Ts systems that compromised oob auth" http://t.co/4nDDAxtB #
- This Cloudflare blog http://t.co/KeUHAfoR shows how much we can learn when we talk about attacks, rather than hiding them. #
- RT @netik OH: Of course you need extra gorilla suits. You can't wear a white gorilla suit after labor day. Geesh. #
- http://t.co/On6Vcws7 doesn't make it easy to opt out (and if you're an AT&T customer, you should). Why not work from a phone #? #
- New Blog: "On @Cloudflare's post-mortem" http://t.co/quXhyd3z #
- RT @joshcorman follow for DM? << You know, there are email tools that give you 150+ characters, subject lines? 🙂 #
- RT @451wendy RT @rachelchalmers: There's a little black spot on the sun today. < It's the same old thing as yesterday. #
- RT @thedarktangent Secretary says Cyber and Aviation security consume more of her time than ever before. #DHS < This juxtaposition scares me #
- RT @thedarktangent honored to co-chair new task force on #cyber workforce development to develop a long term strategy for #DHS < Congrats! #
- RT @Beaker Updated BYOD security profile/policy pushed to my iPhone this morning. String passwords on phone unlock (really?) = PiTA. #
- Intrusive password policies spend compliance #
- Bad password policies give no benefit while absorbing your people's willingness to help with security. #Fail (cc @beaker) #
- RT @moxie If LinkedIn hasn't confirmed the breach, they havent fixed it either. You can change your PW, but attackers can just get it again #
- MT @amrittsering Too bad there've been so few data breaches to help folks deal with the linkedin breach, if only we had a more learning opps #
- RT @aloria Another password breach, another round of "how to create strong passwords" lectures. THEY'LL TOTALLY LISTEN THIS TIME! #adorable #
- MT @jeremiahg Instincts telling me these incidents are connected. Wondering if all 3 using the same DEV framework. << or same PR checklist? #
- I'll bet we see 10-20 announcements of password breaches hoping to be in the LinkedIn PR shadow. Reminds me a bit of Heartland/inauguration #
- RT @451wendy @securityninja That would be fantastic. We need more security card games besides Elevation of Privilege. #
- There's a fascinating difference between security people & normal folks when there's a guy on the bus with a test LTE wifi gateway. #
- RT @AngryBFlay A dash of granola is a great way to add excitement to a dish if you have zero grasp of what the fuck excitement means. #
- RT @MSFTnews To track or not to track? Not just a question, a choice for consumers and industry http://t.co/906dY7D4 #
- RT @philvenables More new school thinking from the Feynman archives. Listen to this while thinking of InfoSec. http://t.co/SiFpDkxT #
- RT @3ricj Now everybody but me has my linked in password. This can only lead to future job offers. #
Powered by Twitter Tools