Twitter | Search | |
Search Refresh
The Ethical Hacker Network (EH-Net) Oct 17
Webinar: "Hacking Humans" Join & on thoughts, actions & people around you—plus what a career in REALLY looks like—in this FREE webinar on Tues Oct 29 @ 1:00 PM EDT
Reply Retweet Like
Rob 27m
A worthwhile watch for anyone who doesn’t consider the risks involved with the information they share.
Reply Retweet Like
Ahmed Karam أحمد كرم Oct 22
Reply Retweet Like
Lisa Forte Oct 22
is a growing threat and when research revealed by Ars Technica shows how voice assistants can be turned into tools to obtain passwords by faking failed updates it all becomes a bit concerning!
Reply Retweet Like
fausto rowlan Oct 22
Replying to @LMNewssource
Typical stunt. like trying to force you to buy smaller cars by making parking spaces narrower. It doesn't actually do any good, it just pisses people off.
Reply Retweet Like
TrampMouth Oct 21
Why would you censor anyone?... If he's not fit, then he's not fit, and should be removed. Doesn't this go against your, fist-under-chin, horse 💩 values?
Reply Retweet Like
Bob Knoxious 1h
Is this what is making people angry edgy unable to communicate? One thing I've noticed from when I was a boy Fire and waves leaves and blowing braches shown in reverse on TV and movies
Reply Retweet Like
Fionn O Lochlainn 5h
programmers r sadistic promoters,& cultivators of perversion Seeing t/increase in demand for child mutilation is heartbreaking, & knowing it's premeditated makes it evn worse. MSM's subversive attack on innocence & nature is evil.
Reply Retweet Like
Defensury 18h
Did you know that Defensury uses methods such as when finding vulnerabilities in your company? Real life threats demand a realistic approach. Contact us for more information on how we can help your company.
Reply Retweet Like
RogerDis 7h
Once prestigious universities - similar to what celebrities are bribing their offspring into acceptance, are manipulating mass public newspapers . Even more egregious than the TWO DECADES of medical device failures in HIDDEN DATABASE.
Reply Retweet Like
Judith Kaufman J.D. 7h
of the human mind 😭
Reply Retweet Like
Christina Lekati 12h
It is quite redundant to run a simulation in an org. where there have been poor training & awareness practices. You already know what is going to happen. Educate the people first and then test how they can hold up against an attack, it is more efficient.
Reply Retweet Like
Proofpoint 17h
What is ? It’s the art and science of manipulation. A wide array of tactics that can be used to trick you into opening a malicious email attachment, clicking on an unsafe URL, or sending money...
Reply Retweet Like
Steve Tran 11h
Thanks for the cool playing cards. Can definitely incorporate this into my routine and fits the theme!
Reply Retweet Like
Ian Sorensen 🐙 Oct 22
Replying to @MalwareJake
If I had as much money in my account as my Social Security number, I'd consider starting my own ISP.
Reply Retweet Like
spookydreamer Oct 18
Reply Retweet Like
Phil Thornton Oct 18
Need some SE expertise - who is that woman that is really good at SE? I know I follow her but can't find her....
Reply Retweet Like
SANS Security Awareness Oct 22
Have you crafted a stellar campaign or seen a clever sample of one? Show us your favorite phishing examples for a chance to win a $50 Amazon gift card. Shoot us an email with your phishing template(s)/example(s) along with your name to: phishbounty@sans.org
Reply Retweet Like
Steve Rezhener 1h
An idea for a new Netflix - , , , and !
Reply Retweet Like
yo 8h
He wanted a quick demo. ... " Challenge accepted !! "
Reply Retweet Like