Quantcast
Channel: myspace – spylogic.net
Browsing all 12 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Exploiting trust in social networks

Over the weekend I posted my first article on Social Network/Media security over at Blogsecurify. You can check out the post here. My next article will talk about the security of third-party...

View Article



Image may be NSFW.
Clik here to view.

Password Length and Complexity for Social Media Sites

July 1st was “Twittersec” day as coined by @hevnsnt over at I-Hacked.com to designate July 1st as change your Twitter password day. Why? Mostly because July is the “month of Twitter bugs” created by a...

View Article

Image may be NSFW.
Clik here to view.

Social Zombies Invade Las Vegas!

Yes, you are reading the title of this post correctly!  Massive Zombie attacks at DefCon this year…bring your shotgun (we are kidding of course, please do not bring firearms to DefCon…you will make the...

View Article

Image may be NSFW.
Clik here to view.

Social Zombies Slides and DEFCON Updates

Kevin and I want to thank everyone that came out to our talk at DEFCON 17 this past weekend.  We had a great time giving the talk and thanks for the feedback!  Even the two Facebook developers that...

View Article

Image may be NSFW.
Clik here to view.

Social Zombies: Your Friends Want To Eat Your Brains Video from DEFCON Posted

The video from the talk Kevin Johnson and I did at DEFCON 17 called “Social Zombies: Your Friends Want To Eat Your Brains” is now up on Vimeo.  If you missed us at DEFCON Kevin and I will be presenting...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Open Source Intelligence Gathering – Part 1 Social Networks

UPDATE: You can now download my slide deck from SlideShare. Next week I will be speaking at the 7th Annual Ohio Information Security Summit on “Enterprise Open Source Intelligence Gathering”.  Here is...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards...

This post is part two of my three part series on Enterprise Open Source Intelligence Gathering.  This information relates to the presentation that I am giving this week at the 7th Annual Ohio...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social...

This is the final article in my series on Enterprise Open Source Intelligence Gathering.  This information relates to the main topics from my presentation that I am giving this week at the 7th Annual...

View Article


Image may be NSFW.
Clik here to view.

Social Zombies at OWASP AppSec DC this Week

Continuing the zombie apocalypse from Defcon…Kevin Johnson and I will again be presenting “Social Zombies: Your Friends Want to Eat Your Brains” at this week’s OWASP AppSec DC conference.  We will be...

View Article


Image may be NSFW.
Clik here to view.

Two New Social Media Security White Papers Released

My employer (SecureState) has released two white papers as part of our Social Media Security Awareness Month.  You can also download some cool wallpaper for this month created by Rob our graphic...

View Article

Exploiting trust in social networks

Over the weekend I posted my first article on Social Network/Media security over at Blogsecurify. You can check out the post here. My next article will talk about the security of third-party...

View Article

Password Length and Complexity for Social Media Sites

July 1st was “Twittersec” day as coined by @hevnsnt over at I-Hacked.com to designate July 1st as change your Twitter password day. Why? Mostly because July is the “month of Twitter bugs” created by a...

View Article
Browsing all 12 articles
Browse latest View live


Latest Images