SlideShare a Scribd company logo
1 of 89
SOCIAL ZOMBIES II
 Your Friends Need More Brains
Starring...
tom Eston
Robin
Wood
Kevin Johnson
Social Networks
   Where are we today?
350 Million Users
  (how many of these are fake?)
120 Million Login Daily
6.2 million joining Twitter
      every month
End of 2009:
75 Million Users
It’s all about trust...
Fake accounts? Orly?
Who is the most dangerous
 woman on the Internet?
Advanced
Persistent
Threat
What makes a
 Jessica Biel?
Thank You!


Prabhu Deva
    and
Nathan Hamiel
Lava Roll
  FTW
Still easy to exploit trust!
•   More difficult to tell a bot from a real
    account
•   Accounts are easy to create
•   Socnet User Verification = FAIL
    •   Twitter “Verified” Accounts?
•   Connections based on other “friends”
New Privacy Concerns
New Facebook Privacy
      Settings
•   Your info is even more open!
•   Your Name, Profile Picture, Gender, Current
    City, Networks, Friend List, and Pages are all
    public

•   “Suggested” settings are set to EVERYONE
•   Zuckerburg says users don’t want privacy...
Really?
Epic FAIL?
Blippy FTW
Blippy FTW
"I Joined BLIPPY and all I got
    was Jacked at the ATM"
            - Chris Nickerson (@indi303) via Twitter
What about the ultimate
     stalker tool?
Geo-Location Tracking
Blippy + Foursquare +
Facebook + Twitter +
LinkedIn = PWNAGE
Why the **** would Socnets
         do this??
“The more info you share...
...the more valuable you are”
Real Time Search FTW
How do pen testers and
  attackers use this?
     Thank you Social Networks!
Wealth of recon
              information!
•   Socnet Search Engines
•   Maltego (Twitter and Facebook)
•   Google Hacks
    •   site:facebook.com inurl:group (bofa | "bank of america")
•   Manual Searching
    •   Status Updates

    •   Real Time Search
Infiltrate a company with
     this information!
New Security Concerns
Koobface Evolving
•   Still the #1 socnet
    worm

•   Targets all major
    socnets
•   Socnet chat vectors

•   Now with CAPTCHA

•   Adobe/IE 0day, Zeus
    Trojans FTL
     *Screen shots via McAfee Labs/PandaLabs
Danger!
Social
Network
Applications
Months of Bugs!
• July 2009 - Month of Twitter Bugs (Aviv Raff)
• September 2009 - Month of Facebook Bugs
  (theharmonyguy)
• Vulnerabilities affecting over 9,700 Facebook
  applications
• Over half of vuln apps had passed the Facebook
  “Verified” Application program

• Six of the hacked applications in the “Top
  10” (Farmville and Causes!)
• Most could be used with ClickJacking to install
More than 218 million Facebook users
          were vulnerable!
Facebook Application
       Autopwn Demo
http://www.youtube.com/watch?v=chvwtGPkAIQ
Advanced
Social Network Bots
More Evil Twitter Bots
•   Bots that pull
    trending
    topics...post
    malware links
•   Used recently to
    promote warez like
    pirated movies
•   Easy to code.
    Twitter API FTW
Better Automated Tools

•   Tools are getting more reliable
•   CAPTCHA bypass built in, able to off load to
    outsourced solution
•   Automated tools are cheap!
    Why roll your own?

    (or get it for free via Torrent!)
What is it?


Command and control system
 running over social media
Written in Ruby as a
 proof of concept

Not optimized. Not stealthy.
Currently runs over:


     •Twitter
     • JPEG
     • TinyURL
And now...
Uses LinkedIn API to read
and write the Status field
Also new...
 Windows Support

Basic Ruby install with a few
    gems and off it goes
What’s Next?

Other media types, possibly non-
        HTML based.

    Please give suggestions!
New KreiosC2 Demo
http://www.vimeo.com/9295657
Third Party APIs FTW
SocNet APIs
• Social network
  APIs provide a
  wealth of
  information
• All the big ones
  offer them
   • Some play
      catch up
• We get to play
  with these APIs
Im'ma Let You Finish

• New front end for
  Social Butterfly
• KanyeWestify
  allows us to
  update your wall
Westify'ing someone
• Select a friend
   • Drop down helps
• Their wall now has the
  update
So what did we do?
•   Using the API, we grabbed the user's
    information

•   And their Friends' data

•   In this version we used the FQL
    queries from theHarmonyGuy

     •   Full backup of your account

•   We also used JS to brute force
    browser history

     •   We can map visited pages to user's
         of Facebook!

     •   Marketing FTW!
Have the undead won?
We need more brains!

 •   User education...yeah, it’s hard
 •   Better privacy controls
 •   End opt-in developer models
 •   Tighter control of APIs
Questions?

•   News, Research, Guides,Video’s
    SocialMediaSecurity.com
•   Download KreiosC2
    digininja.org
•   Follow us...if you dare
    @agent0x0, @digininja, @secureideas

More Related Content

What's hot

Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreEC-Council
 
Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0davidsc13
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNuttMcNutt
 
Squiz Launch Presentation
Squiz Launch PresentationSquiz Launch Presentation
Squiz Launch PresentationMike Barrett
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Dave Briggs
 
Craig's List Nonprofit Bootcamp
Craig's List Nonprofit BootcampCraig's List Nonprofit Bootcamp
Craig's List Nonprofit BootcampBeth Kanter
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
 
Perfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandPerfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandIan Forrester
 
Social media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeonSocial media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeonLaurent François
 
Inspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleInspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleParisa Mohammadpour
 
Dave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing MistakesDave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing MistakesSocial Media for Nonprofits
 
Online 2012 presentation
Online 2012 presentationOnline 2012 presentation
Online 2012 presentationPhil Bradley
 
Increase Engagement at Your Event
Increase Engagement at Your EventIncrease Engagement at Your Event
Increase Engagement at Your EventElizabeth Glau, CMP
 
Crowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopCrowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopBrian Herbert
 
The Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ PlusThe Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ PlusAdria Richards
 

What's hot (20)

Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon Creekmore
 
Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
 
SOSM
SOSMSOSM
SOSM
 
Squiz Launch Presentation
Squiz Launch PresentationSquiz Launch Presentation
Squiz Launch Presentation
 
Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...Developing a career using social media in government, without actually gettin...
Developing a career using social media in government, without actually gettin...
 
Craig's List Nonprofit Bootcamp
Craig's List Nonprofit BootcampCraig's List Nonprofit Bootcamp
Craig's List Nonprofit Bootcamp
 
Tech Trends
Tech TrendsTech Trends
Tech Trends
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
Norway real-2
Norway real-2Norway real-2
Norway real-2
 
Perfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, IrelandPerfect Understanding at Media2020, Ireland
Perfect Understanding at Media2020, Ireland
 
Social media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeonSocial media what's going? v3 by Laurent François aka lilzeon
Social media what's going? v3 by Laurent François aka lilzeon
 
Inspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it peopleInspiring Quotes by top 10 it people
Inspiring Quotes by top 10 it people
 
Dave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing MistakesDave McMurtry: Top Ten Social Media Marketing Mistakes
Dave McMurtry: Top Ten Social Media Marketing Mistakes
 
Online 2012 presentation
Online 2012 presentationOnline 2012 presentation
Online 2012 presentation
 
Creative social learning
Creative social learningCreative social learning
Creative social learning
 
Increase Engagement at Your Event
Increase Engagement at Your EventIncrease Engagement at Your Event
Increase Engagement at Your Event
 
Responsible Journalism EPQ
Responsible Journalism EPQ Responsible Journalism EPQ
Responsible Journalism EPQ
 
Crowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopCrowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi Workshop
 
The Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ PlusThe Pluses And Minuses of Google+ Plus
The Pluses And Minuses of Google+ Plus
 

Viewers also liked

Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Aspenware
 
The 'selfie effect' in regular society
The 'selfie effect' in regular societyThe 'selfie effect' in regular society
The 'selfie effect' in regular societyUpekha Vandebona
 
The Power of the Selfie
The Power of the SelfieThe Power of the Selfie
The Power of the Selfieanas-hasan
 
The Art of the Presentation
The Art of the PresentationThe Art of the Presentation
The Art of the PresentationJeffrey Stevens
 
Zombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesikZombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesikEric Pesik
 
The Three Lies About Your Age
The Three Lies About Your AgeThe Three Lies About Your Age
The Three Lies About Your AgeSean Si
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldSean Si
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionTim O'Reilly
 

Viewers also liked (9)

Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.Taking the Share out of Sharepoint: SharePoint Application Security.
Taking the Share out of Sharepoint: SharePoint Application Security.
 
The 'selfie effect' in regular society
The 'selfie effect' in regular societyThe 'selfie effect' in regular society
The 'selfie effect' in regular society
 
Imagine Your Life Without the Internet
Imagine Your Life Without the InternetImagine Your Life Without the Internet
Imagine Your Life Without the Internet
 
The Power of the Selfie
The Power of the SelfieThe Power of the Selfie
The Power of the Selfie
 
The Art of the Presentation
The Art of the PresentationThe Art of the Presentation
The Art of the Presentation
 
Zombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesikZombie PowerPoint by @ericpesik
Zombie PowerPoint by @ericpesik
 
The Three Lies About Your Age
The Three Lies About Your AgeThe Three Lies About Your Age
The Three Lies About Your Age
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx version
 

Similar to Social Zombies II: Your Friends Need More Brains

Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Behrouz Sadeghipour
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
Social Media and Crisis Management
Social Media and Crisis ManagementSocial Media and Crisis Management
Social Media and Crisis ManagementMark Gibbs
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!InnoTech
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
The Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyThe Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyRazorfish
 
Digital Innovation in Asia
Digital Innovation in AsiaDigital Innovation in Asia
Digital Innovation in AsiaBenjamin Joffe
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedFelipe Prado
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Digital survival guide
Digital survival guideDigital survival guide
Digital survival guideAlex Stonehill
 
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social NetworkingCIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social NetworkingKantar Media CIC
 

Similar to Social Zombies II: Your Friends Need More Brains (20)

Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Social Media Dataset
Social Media DatasetSocial Media Dataset
Social Media Dataset
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
NPTs
NPTsNPTs
NPTs
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Social Media and Crisis Management
Social Media and Crisis ManagementSocial Media and Crisis Management
Social Media and Crisis Management
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
The Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi JacobyThe Year Ahead in Social Media - Rafi Jacoby
The Year Ahead in Social Media - Rafi Jacoby
 
Digital Innovation in Asia
Digital Innovation in AsiaDigital Innovation in Asia
Digital Innovation in Asia
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Digital survival guide
Digital survival guideDigital survival guide
Digital survival guide
 
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social NetworkingCIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
CIC IWOM Panel: Jiepang CEO David on The New Age of Social Networking
 

More from Tom Eston

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Tom Eston
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Tom Eston
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on TwitterTom Eston
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-MiddleTom Eston
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsTom Eston
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactTom Eston
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkTom Eston
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 

More from Tom Eston (16)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 

Recently uploaded

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 

Recently uploaded (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 

Social Zombies II: Your Friends Need More Brains