Exploiting trust in social networks
Over the weekend I posted my first article on Social Network/Media security over at Blogsecurify. You can check out the post here. My next article will talk about the security of third-party...
View ArticlePassword Length and Complexity for Social Media Sites
July 1st was “Twittersec” day as coined by @hevnsnt over at I-Hacked.com to designate July 1st as change your Twitter password day. Why? Mostly because July is the “month of Twitter bugs” created by a...
View ArticleSocial Zombies Invade Las Vegas!
Yes, you are reading the title of this post correctly! Massive Zombie attacks at DefCon this year…bring your shotgun (we are kidding of course, please do not bring firearms to DefCon…you will make the...
View ArticleSocial Zombies Slides and DEFCON Updates
Kevin and I want to thank everyone that came out to our talk at DEFCON 17 this past weekend. We had a great time giving the talk and thanks for the feedback! Even the two Facebook developers that...
View ArticleSocial Zombies: Your Friends Want To Eat Your Brains Video from DEFCON Posted
The video from the talk Kevin Johnson and I did at DEFCON 17 called “Social Zombies: Your Friends Want To Eat Your Brains” is now up on Vimeo. If you missed us at DEFCON Kevin and I will be presenting...
View ArticleEnterprise Open Source Intelligence Gathering – Part 1 Social Networks
UPDATE: You can now download my slide deck from SlideShare. Next week I will be speaking at the 7th Annual Ohio Information Security Summit on “Enterprise Open Source Intelligence Gathering”. Here is...
View ArticleEnterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards...
This post is part two of my three part series on Enterprise Open Source Intelligence Gathering. This information relates to the presentation that I am giving this week at the 7th Annual Ohio...
View ArticleEnterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social...
This is the final article in my series on Enterprise Open Source Intelligence Gathering. This information relates to the main topics from my presentation that I am giving this week at the 7th Annual...
View ArticleSocial Zombies at OWASP AppSec DC this Week
Continuing the zombie apocalypse from Defcon…Kevin Johnson and I will again be presenting “Social Zombies: Your Friends Want to Eat Your Brains” at this week’s OWASP AppSec DC conference. We will be...
View ArticleTwo New Social Media Security White Papers Released
My employer (SecureState) has released two white papers as part of our Social Media Security Awareness Month. You can also download some cool wallpaper for this month created by Rob our graphic...
View ArticleExploiting trust in social networks
Over the weekend I posted my first article on Social Network/Media security over at Blogsecurify. You can check out the post here. My next article will talk about the security of third-party...
View ArticlePassword Length and Complexity for Social Media Sites
July 1st was “Twittersec” day as coined by @hevnsnt over at I-Hacked.com to designate July 1st as change your Twitter password day. Why? Mostly because July is the “month of Twitter bugs” created by a...
View Article