Twitter Security

379 views
343 views

Published on

This is a Pecha Kucha presentation I made at the Virtual Round Table. It covers the basics behind what a Twitter worm looks like and how to disinfect yourself. It also includes some tips on how to filter out worms to begin with.

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
379
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
9
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Twitter Security

  1. 1. The Frontier of Twitter
  2. 2. 1) Early Adopters/Experimenters 2) Utilizers/”Sneezers” 3) Widespread Use 4) Hackers and Spammers move in Evolution of Major Technologies
  3. 3. Bad Security = Bad Reputation Bad Reputation = Missed Connections
  4. 4. When you follow someone ... By: Townend Photography DM me sometime! Don't mind if I do.
  5. 5. I have a treat for you.
  6. 6. Most Common URL Shorteners: tinyurl.com, bit.ly, j.mp, su.pr, ow.ly, tr.im, is.gd, twitpic.com
  7. 7. Tools to check URLS: Tweetdeck PowerTwitter for FireFox (You use FireFox right?)
  8. 8. Characteristics of Worm Messages: <ul><li>Ambiguous
  9. 9. Invite you to a quiz
  10. 10. Contain a leading question </li></ul>
  11. 11. What to Do – Step 1
  12. 12. What to Do – Step 2
  13. 15. Where do worms come from?
  14. 16. Back in the Good ol' Days (a year ago) ...
  15. 17. Oauth to the rescue! (sort of)
  16. 19. Oauth = Permanent Pipe to your account
  17. 21. Rule: When in doubt, revoke.
  18. 22. Action Steps 1) Inform users they are hacked 2) Don't click on strange links (no, seriously don't) 3) Oauth = better, username/password = not so good 4) Set SocialToo.com filters

×