Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Phishing
John Opdenakker
j_opdenakker
Every day should be #SaferInternetDay , but still I'll tweet some security tips (and links to blogs) throughout the day.1. You can’t lose what you don’t have. Only register an
Read more
Pieter Gunst
DigitalLawyer
Oooof. Was just subjected to the most credible phishing attempt I've experienced to date. Here were the steps:1) "Hi, this is your bank. There was an attempt to use your
Read more
North Somerset Council
NorthSomersetC
We’re supporting #StopAdultAbuseWeek a local initiative helping people look out for the most vulnerable members of our communities. We urge you to look out for people in your area, and
Read more
Aubriana Aurora
lilimobeth
#UgandaYoweri Museveni is trying to cripple financial systems & social media accounts of his critics. This won't save him. He's wasting taxpayers' money. Ensi ezo ezikozesa Huawei, Pegasus, ne lazarus
Read more
Ruchira
RuchiraGhosh
Has she been scammed or is she the scammer who is scamming us? Nidhi Razdan; a thread:1. She claimed to have received a letter of appointment from the Harvard University
Read more
Kristina Gehrmann
KristinaDraws
Are you an artist looking for work? Are you easy to contact by e-mail?I looked at some social media profiles today, and from a client's point of view some of
Read more
Dean
Dynbnyy
Hati-hati dikirimin link penipuan yang ada bitly bitly nya gitu, tak kasih tau cara ngecek yang aman. [A Thread] Sering kan dapet link yg depannya bit[.]ly, atau s[.]id ?, itu
Read more
Lorenzo Franceschi-Bicchierai (he/him)
lorenzofb
NEW: We found a spy company’s malicious, fake WhatsApp download page.Technical analyses by Citizen Lab and Motherboard found links between the fake version of WhatsApp and Cy4gate, a provider of
Read more
Оlga Belogolova
olgs7
In week 8 of “Lies & Disinformation” @Georgetown, we focused on how state-sponsored espionage operations, hacks and leaks can play a role in influence operations. How does the dissemination of
Read more
CompSci & Security ARMY
ArmyCompsci
Sup ARMY! Since today is #SaferInternetDay (I only just found out, oops), let’s talk about something we’ve been seeing a lot of lately in our timelines.Crypto currency giveaways
Read more
John Jackson 桜の侍
johnjhacking
1/A thread about Information Security and Stealing from Children:When I was younger, I used to spend summers at the Ronald McDonald house while my nephew with Cerebral Palsy would recover
Read more
pry - Ben Bidmead
pry0cc
Peeps - you don't need a MacBook Pro to hack.All you really need is a light laptop that can run Linux or a cheap Macbook and then just abuse the
Read more
David
dmlayt
@thisisbullish https://twitter.com/jessefelder/status/1329102138774065158 I'm a fan of Jesse's work and will continue to be, but this was hard to read. Some thoughts I hope Jesse considers.a. No, bitcoin has never been
Read more
Lindsay P. Gorman
LindsayPGorman
Parler back up thanks to Russian DDoS protection software DDoS-Guard IP.Fun fact: DDoS-Guard IP also hosts the official website for Hamas.https://twitter.com/adamsculthorpe/status/1350872780355596289 It remains to be seen how much the platf
Read more
Seanie B.
seanieb
About every 9 months I forget why I don’t use @RobinhoodApp Using Plaid works for @RobinhoodApp because it saves them& development time, It works for Plaid (Visa) because they get
Read more
Rachel Tobac
RachelTobac
Twitter Hack update: for ~8 victims, the attackers downloaded the “Your Twitter Data” archive file which includes: DMs, lists created (presumably including private lists), email, phone, history of places been
Read more
‹
1
2
3
4
5
6
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree