... on Twitter
Crooks Net Millions in Coordinated ATM Heists http://t.co/8mWtZz6g [$9M on Xmas eve, > 12 countries]
Crooks Net Millions in Coordinated ATM Heists http://t.co/8mWtZz6g [$9M on Xmas eve, > 12 countries]
#NotInfosec #Humor OSX TextEdit crashing in spell-checker http://t.co/dFezrM9i [reporting tool can also "crash with this crash"]
#NotInfosec #Humor OSX TextEdit crashing in spell-checker http://t.co/dFezrM9i [reporting tool can also "crash with this crash"]
"Today, the most common way of getting hit by malware is by browsing the Web" http://t.co/TPTPPs3q [appears next to @mikko's pic in report]
"Today, the most common way of getting hit by malware is by browsing the Web" http://t.co/TPTPPs3q [appears next to @mikko's pic in report]
RT @EdgarUlloa: "@DrInfoSec: F-Secure declares 2012 'Year of the Exploit' http://t.co/G9sO25d8 [I believe it]"
RT @EdgarUlloa: "@DrInfoSec: F-Secure declares 2012 'Year of the Exploit' http://t.co/G9sO25d8 [I believe it]"
"@DrInfoSec: F-Secure declares 2012 'Year of the Exploit' http://t.co/G9sO25d8 [I believe it]"
"@DrInfoSec: F-Secure declares 2012 'Year of the Exploit' http://t.co/G9sO25d8 [I believe it]"
F-Secure declares 2012 'Year of the Exploit' http://t.co/TPTPPs3q [I believe it]
F-Secure declares 2012 'Year of the Exploit' http://t.co/TPTPPs3q [I believe it]
New malware sleeps its way into financial institutions http://t.co/Kas8rHHe [takes a 10min nap to avoid automated analysis] #SleepingFTW
New malware sleeps its way into financial institutions http://t.co/Kas8rHHe [takes a 10min nap to avoid automated analysis] #SleepingFTW
Researchers warn of cyber flaws in Honeywell control systems http://t.co/oCdv9huE ["Don't put it on the net." <- good advice for SCADA]
Researchers warn of cyber flaws in Honeywell control systems http://t.co/oCdv9huE ["Don't put it on the net." <- good advice for SCADA]
Chinese malware targeted US drone secrets, security firm alleges http://t.co/vWbfhwYO [operation Beebus]
Chinese malware targeted US drone secrets, security firm alleges http://t.co/vWbfhwYO [operation Beebus]
QOTD on AV: sig-based AV "not enough in a world that is changing daily from attacks and threats" http://t.co/TUdcbu8U #InfoSecBlogs
QOTD on AV: sig-based AV "not enough in a world that is changing daily from attacks and threats" http://t.co/TUdcbu8U #InfoSecBlogs
Crooks, think your Trojan looks legit? This one has a DIGITAL CERT. http://t.co/4NT0z7CU [dig. cert != safe]
Crooks, think your Trojan looks legit? This one has a DIGITAL CERT. http://t.co/4NT0z7CU [dig. cert != safe]
Broad Powers Seen for Obama in Cyberstrikes http://t.co/kApKAY20 [US flexing its cyber-muscles]
Broad Powers Seen for Obama in Cyberstrikes http://t.co/kApKAY20 [US flexing its cyber-muscles]
Hackers hit U.S. Department of Energy http://t.co/KgMt6Zfc [employee & contractor PII]
Hackers hit U.S. Department of Energy http://t.co/KgMt6Zfc [employee & contractor PII]
@jenveltsos The rumor is we'll meet her at the end of the season. Of course, they just got renewed for a 9th season, so we'll see,
@jenveltsos The rumor is we'll meet her at the end of the season. Of course, they just got renewed for a 9th season, so we'll see,
@aspatriarca I agree. The Barney/Robin stuff is sweet but dragging down the funny. And when do we get to meet the mother??
@aspatriarca I agree. The Barney/Robin stuff is sweet but dragging down the funny. And when do we get to meet the mother??
@jenveltsos I thought last night's episode was one of the more entertaining ones this season, partly because of that theory.
@jenveltsos I thought last night's episode was one of the more entertaining ones this season, partly because of that theory.
#InfoSecBlogs QOTD on Dealing with Advanced Attackers: ... Preventing attackers from getting anything useful off... http://t.co/aZQGWDdF
#InfoSecBlogs QOTD on Dealing with Advanced Attackers: ... Preventing attackers from getting anything useful off... http://t.co/aZQGWDdF
My Tweeted Times http://t.co/Ed2IU2j1 - top stories by STOPTHNKCONNECT, teksquisite, DrInfoSec
My Tweeted Times http://t.co/Ed2IU2j1 - top stories by STOPTHNKCONNECT, teksquisite, DrInfoSec
The Dobler/Dahmler Theory: Whether a gesture is charming or alarming depends upon how it is received. #HIMYM
The Dobler/Dahmler Theory: Whether a gesture is charming or alarming depends upon how it is received. #HIMYM
RT @PrivacyToday: RT @privacyactivism: RT @DrInfoSec: Malware spammed out widely posing as income tax email http://t.co/oExdmQal ['tis t ...
RT @PrivacyToday: RT @privacyactivism: RT @DrInfoSec: Malware spammed out widely posing as income tax email http://t.co/oExdmQal ['tis t ...