SlideShare a Scribd company logo
1 of 16
Download to read offline
A Look Back At 12 Twitter Attacks by

Kim Rene Jensen, +45 31668595, krjensen@websense.com
A Look Back At 12 Twitter Attacks




      http://www.crn.com/security/219100457

              07 August 2009



                                              2
Twitter Attack No.1




                      3
Twitter Attack No.2




                      4
Twitter Attack No.3




                      5
Twitter Attack No.4




                      6
Twitter Attack No.5




                      7
Twitter Attack No.6




                      8
Twitter Attack No.7




                      9
Twitter Attack No.8




                      10
Twitter Attack No.9




                      11
Twitter Attack No.10




                       12
Twitter Attack No.11




                       13
Twitter Attack No.12




                       14
Twitter Attack No.13




                       15
16

More Related Content

What's hot

Lessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SFLessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SFPek Pongpaet
 
Brian Patterson - ICPHSO 2015 - Social Media & Recalls
Brian Patterson - ICPHSO 2015 - Social Media & RecallsBrian Patterson - ICPHSO 2015 - Social Media & Recalls
Brian Patterson - ICPHSO 2015 - Social Media & RecallsBrian Patterson
 
How to use ifttt slides
How to use ifttt slidesHow to use ifttt slides
How to use ifttt slidesBryan Arante
 
The positive effects technology has on our lives
The positive effects technology has on our livesThe positive effects technology has on our lives
The positive effects technology has on our livesDamian Gatling
 
9 Best Practices in Social for Franchises
9 Best Practices in Social for Franchises9 Best Practices in Social for Franchises
9 Best Practices in Social for FranchisesQiigo
 
Storybird - Making Your Story Public
Storybird  - Making Your Story PublicStorybird  - Making Your Story Public
Storybird - Making Your Story PublicReba Gordon Matthews
 
2014 Email Evolution Conference Closing Keynote Presentation
2014 Email Evolution Conference Closing Keynote Presentation2014 Email Evolution Conference Closing Keynote Presentation
2014 Email Evolution Conference Closing Keynote PresentationRyan Phelan
 
Twitter Api 번역계획서
Twitter Api 번역계획서Twitter Api 번역계획서
Twitter Api 번역계획서Jinho Jung
 
How to get maximum from Magento community
How to get maximum from Magento community How to get maximum from Magento community
How to get maximum from Magento community Vasyl Malanka
 
K8 2015: Welcome Presentation by Ted Krantz
K8 2015: Welcome Presentation by Ted KrantzK8 2015: Welcome Presentation by Ted Krantz
K8 2015: Welcome Presentation by Ted KrantzKenshoo
 
18+ Ways To Help Clients Love You
18+ Ways To Help Clients Love You18+ Ways To Help Clients Love You
18+ Ways To Help Clients Love YouKeith Brooks
 
Why live streaming is becoming crucial in a social media strategy? Social Med...
Why live streaming is becoming crucial in a social media strategy? Social Med...Why live streaming is becoming crucial in a social media strategy? Social Med...
Why live streaming is becoming crucial in a social media strategy? Social Med...Lisa Lombardi
 
Defending yourself from the internet
Defending yourself from the internetDefending yourself from the internet
Defending yourself from the internetPeter Kellner
 
The ABCs of Twitter Analytics
The ABCs of Twitter Analytics The ABCs of Twitter Analytics
The ABCs of Twitter Analytics Tina Powell
 
SMAC- Facebook Analytics
SMAC- Facebook AnalyticsSMAC- Facebook Analytics
SMAC- Facebook AnalyticsSarwan Singh
 
Twitter part 2: WHO follows ME?
Twitter part 2: WHO follows ME?Twitter part 2: WHO follows ME?
Twitter part 2: WHO follows ME?Timo Savolainen
 

What's hot (20)

Lessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SFLessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SF
 
Brian Patterson - ICPHSO 2015 - Social Media & Recalls
Brian Patterson - ICPHSO 2015 - Social Media & RecallsBrian Patterson - ICPHSO 2015 - Social Media & Recalls
Brian Patterson - ICPHSO 2015 - Social Media & Recalls
 
How to use ifttt slides
How to use ifttt slidesHow to use ifttt slides
How to use ifttt slides
 
The positive effects technology has on our lives
The positive effects technology has on our livesThe positive effects technology has on our lives
The positive effects technology has on our lives
 
Pivotal tracker
Pivotal trackerPivotal tracker
Pivotal tracker
 
9 Best Practices in Social for Franchises
9 Best Practices in Social for Franchises9 Best Practices in Social for Franchises
9 Best Practices in Social for Franchises
 
Elixir in Production
Elixir in ProductionElixir in Production
Elixir in Production
 
Geetramayan slideshare app
Geetramayan slideshare appGeetramayan slideshare app
Geetramayan slideshare app
 
Storybird - Making Your Story Public
Storybird  - Making Your Story PublicStorybird  - Making Your Story Public
Storybird - Making Your Story Public
 
Twitmusic
TwitmusicTwitmusic
Twitmusic
 
2014 Email Evolution Conference Closing Keynote Presentation
2014 Email Evolution Conference Closing Keynote Presentation2014 Email Evolution Conference Closing Keynote Presentation
2014 Email Evolution Conference Closing Keynote Presentation
 
Twitter Api 번역계획서
Twitter Api 번역계획서Twitter Api 번역계획서
Twitter Api 번역계획서
 
How to get maximum from Magento community
How to get maximum from Magento community How to get maximum from Magento community
How to get maximum from Magento community
 
K8 2015: Welcome Presentation by Ted Krantz
K8 2015: Welcome Presentation by Ted KrantzK8 2015: Welcome Presentation by Ted Krantz
K8 2015: Welcome Presentation by Ted Krantz
 
18+ Ways To Help Clients Love You
18+ Ways To Help Clients Love You18+ Ways To Help Clients Love You
18+ Ways To Help Clients Love You
 
Why live streaming is becoming crucial in a social media strategy? Social Med...
Why live streaming is becoming crucial in a social media strategy? Social Med...Why live streaming is becoming crucial in a social media strategy? Social Med...
Why live streaming is becoming crucial in a social media strategy? Social Med...
 
Defending yourself from the internet
Defending yourself from the internetDefending yourself from the internet
Defending yourself from the internet
 
The ABCs of Twitter Analytics
The ABCs of Twitter Analytics The ABCs of Twitter Analytics
The ABCs of Twitter Analytics
 
SMAC- Facebook Analytics
SMAC- Facebook AnalyticsSMAC- Facebook Analytics
SMAC- Facebook Analytics
 
Twitter part 2: WHO follows ME?
Twitter part 2: WHO follows ME?Twitter part 2: WHO follows ME?
Twitter part 2: WHO follows ME?
 

More from Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Twitter Attacks