Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
Adrienne Porter Felt 26 Jan 16
"Users are not the enemy... and developers are not the enemy either" -Matthew Smith on usable security
Reply Retweet Like
Dr. Erik Riedel 28 Jan 16
Replying to @SwiftOnSecurity
great story similar to this at - they passed the AV a new signature file w its own sig & it deleted itself
Reply Retweet Like
Ash Sethi 27 Jan 16
Amazing deck: The threats driving the IT security spending and valuation boom
Reply Retweet Like
Nathan Parker 26 Jan 16
shares great street smarts for digital media. These'll augment discussions with my kids.
Reply Retweet Like
Life at Google 26 Jan 16
Create & maintain the safest operating environment for Google users & developers
Reply Retweet Like
Tom Simonite 27 Jan 16
NSA's chief hacker invites crowd to scan a QR code. Hilarity ensues.
Reply Retweet Like
π™ΉπšŠπšŸπš’πšŽπš› π™ΌπšŠπš›πšŒπš˜πšœ ⚑️ 29 Jan 16
Blog post by : Hardware and Firmware Attacks: Defending, Detecting, and Responding -
Reply Retweet Like
Vito Genovese 27 Jan 16
Reply Retweet Like
Dug Song 27 Jan 16
Replying to @ncweaver
Missing 's talk at :-( Is his demo as legally questionable as mine from a decade+ ago?
Reply Retweet Like
EFF 26 Jan 16
We're unleashing our second-ever CTF hacking contest at tonight. Remote players welcome!
Reply Retweet Like
Dave Jevans 25 Jan 16
Google gives out secure USB charge cords to protect against airport charge stations attacking yr phone
Reply Retweet Like
Phil Venables 27 Jan 16
Best conference I've been to in a long time.....will be back and will be sponsoring no doubt again.
Reply Retweet Like
πŸ–– L.J. Medakovic β˜… 26 Jan 16
": What computer users see in security warning boxes Very, very true. " Need click more OK
Reply Retweet Like
Security Watch 28 Jan 16
Usenix's inaugural Enigma Conference proved to be provocative, informative, and worthy to continue.
Reply Retweet Like
Kurt Opsahl 26 Jan 16
explains how undermining encryption harms human rights. Encrypt all the things!
Reply Retweet Like
Google AI 29 Mar 16
Check out what we've learned in the past 10 years of protecting Gmail users
Reply Retweet Like
Acting Deputy Secretary Kyle Lady 27 Jan 16
Reply Retweet Like
Neil Rubenking 27 Jan 16
"Exceptional access" to encrypted data? Like saying, "make all the cars so they can't outrun police."
Reply Retweet Like
TROOPERS Conference 27 Jan 16
that was fast: talks (videos) starting to show up on …
Reply Retweet Like
Morgan Marquis-Boire 27 Jan 16
"Implementing application whitelisting makes things hard." - NSA/TAO | guys, maybe this is a better idea than pimping PGP.
Reply Retweet Like