SlideShare uma empresa Scribd logo
1 de 20
Staying Safe & Secure
      on Twitter



            Tom Eston
     SocialMediaSecurity.com
Who is this guy?

• Tom Eston, Security Researcher
• Blog: Spylogic.net
• Podcast: Securityjustice.com
• SocialMediaSecurity.com @socialmediasec
• Twitter: @agent0x0
5 1/2 Twitter Threats
Distributed Denial of Service
          (DDoS)
Short URL Services
Third-Party Services
Web Vulnerabilities
• XSS (Cross Site
  Scripting)
• ClickJacking
• Third-Party
  Applications
  (Twitpic,
  BrightKite)
Impersonation &
            Disinformation
• Fake accounts
  (Celebrity)
• Do you trust
  what you
  read?
• Fake Re-
  Tweets
• SPAM
The employees at
          Twitter...srsly.
• Two high profile
  attacks already!
• Don’t use real
  information for
  password reset
  questions!
• Same passwords for
  all accounts = FAIL
How can you stay safe?
#1



#2
NoScript

• Protects you from
  malicious JavaScript
• Prevents XSS/ClickJacking
• Kills unwanted
  ads..improved speed!
• http://noscript.net
Use a Third Party Client

• Safer then using the
  Twitter web client
• Some have issues
  with clear text
  authentication...but...
Long URL Please Add-on
     • Shows you true URL
     • 73+ services supported
     • LongURLPlease.com
Use a Password Manager
• KeePass
• 1Password (iPhone)     keepass.info

• Or...think of a
  password scheme
  (C0mp1exP@assw0rd
  _Tw1tter)
• If one account gets
  compromised...others
  are safe!
Careful what you
    believe, trust but verify...
• Even Tweets from
  your friends! What if
  their account was
  compromised?
  (Koobface)
• News sources can be
  sketchy...
Careful what you
    tweet...
   Everyone is watching.
Monitor your brand
   It’s your reputation at risk.
Twitter needs to take
   security srsly...
        No really.
Questions?
     More information available at:
       SocialMediaSecurity.com

 Email: tom@socalmediasecurity.com
Twitter: @agent0x0 or @socialmediasec

Mais conteúdo relacionado

Destaque

Annotated Bibliography
Annotated BibliographyAnnotated Bibliography
Annotated Bibliography
FelixWilson
 
Feedback from Thesis Presentation
Feedback from Thesis PresentationFeedback from Thesis Presentation
Feedback from Thesis Presentation
FelixWilson
 
Annotated bibliography presentation
Annotated bibliography presentationAnnotated bibliography presentation
Annotated bibliography presentation
FelixWilson
 
3rd years presentation
3rd years presentation3rd years presentation
3rd years presentation
FelixWilson
 
MFA Confirmation Presentation
MFA Confirmation PresentationMFA Confirmation Presentation
MFA Confirmation Presentation
FelixWilson
 
Artefact survey presentation
Artefact survey presentationArtefact survey presentation
Artefact survey presentation
FelixWilson
 

Destaque (17)

Annotated Bibliography
Annotated BibliographyAnnotated Bibliography
Annotated Bibliography
 
Lancer Solutions Capabilities Web Version
Lancer Solutions Capabilities Web VersionLancer Solutions Capabilities Web Version
Lancer Solutions Capabilities Web Version
 
Hoofdstuk 5
Hoofdstuk 5Hoofdstuk 5
Hoofdstuk 5
 
Feedback from Thesis Presentation
Feedback from Thesis PresentationFeedback from Thesis Presentation
Feedback from Thesis Presentation
 
Annotated bibliography presentation
Annotated bibliography presentationAnnotated bibliography presentation
Annotated bibliography presentation
 
3rd years presentation
3rd years presentation3rd years presentation
3rd years presentation
 
HBAGTA and NAHB Profit By Association
HBAGTA and NAHB Profit By AssociationHBAGTA and NAHB Profit By Association
HBAGTA and NAHB Profit By Association
 
MFA Confirmation Presentation
MFA Confirmation PresentationMFA Confirmation Presentation
MFA Confirmation Presentation
 
Artefact survey presentation
Artefact survey presentationArtefact survey presentation
Artefact survey presentation
 
BOM_003_050_059
BOM_003_050_059BOM_003_050_059
BOM_003_050_059
 
Mops Presentation
Mops PresentationMops Presentation
Mops Presentation
 
Artefact Survey
Artefact SurveyArtefact Survey
Artefact Survey
 
Programming To Patterns
Programming To PatternsProgramming To Patterns
Programming To Patterns
 
On the Surface of the Moon
On the Surface of the MoonOn the Surface of the Moon
On the Surface of the Moon
 
Facebook Best Practice Guide - May 2011
Facebook Best Practice Guide - May 2011Facebook Best Practice Guide - May 2011
Facebook Best Practice Guide - May 2011
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 

Semelhante a Staying Safe & Secure on Twitter

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
Luis Grangeia
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 

Semelhante a Staying Safe & Secure on Twitter (20)

Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Two-Steps to Owning MFA
Two-Steps to Owning MFATwo-Steps to Owning MFA
Two-Steps to Owning MFA
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Computer security
Computer securityComputer security
Computer security
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital Marketers
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

Mais de Tom Eston

Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
Tom Eston
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
Tom Eston
 

Mais de Tom Eston (16)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Staying Safe & Secure on Twitter

  • 1. Staying Safe & Secure on Twitter Tom Eston SocialMediaSecurity.com
  • 2. Who is this guy? • Tom Eston, Security Researcher • Blog: Spylogic.net • Podcast: Securityjustice.com • SocialMediaSecurity.com @socialmediasec • Twitter: @agent0x0
  • 3. 5 1/2 Twitter Threats
  • 4. Distributed Denial of Service (DDoS)
  • 7. Web Vulnerabilities • XSS (Cross Site Scripting) • ClickJacking • Third-Party Applications (Twitpic, BrightKite)
  • 8. Impersonation & Disinformation • Fake accounts (Celebrity) • Do you trust what you read? • Fake Re- Tweets • SPAM
  • 9. The employees at Twitter...srsly. • Two high profile attacks already! • Don’t use real information for password reset questions! • Same passwords for all accounts = FAIL
  • 10. How can you stay safe?
  • 11. #1 #2
  • 12. NoScript • Protects you from malicious JavaScript • Prevents XSS/ClickJacking • Kills unwanted ads..improved speed! • http://noscript.net
  • 13. Use a Third Party Client • Safer then using the Twitter web client • Some have issues with clear text authentication...but...
  • 14. Long URL Please Add-on • Shows you true URL • 73+ services supported • LongURLPlease.com
  • 15. Use a Password Manager • KeePass • 1Password (iPhone) keepass.info • Or...think of a password scheme (C0mp1exP@assw0rd _Tw1tter) • If one account gets compromised...others are safe!
  • 16. Careful what you believe, trust but verify... • Even Tweets from your friends! What if their account was compromised? (Koobface) • News sources can be sketchy...
  • 17. Careful what you tweet... Everyone is watching.
  • 18. Monitor your brand It’s your reputation at risk.
  • 19. Twitter needs to take security srsly... No really.
  • 20. Questions? More information available at: SocialMediaSecurity.com Email: tom@socalmediasecurity.com Twitter: @agent0x0 or @socialmediasec