SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
A Look Back At 12 Twitter Attacks by

Kim Rene Jensen, +45 31668595, krjensen@websense.com
A Look Back At 12 Twitter Attacks




      http://www.crn.com/security/219100457

              07 August 2009



                                              2
Twitter Attack No.1




                      3
Twitter Attack No.2




                      4
Twitter Attack No.3




                      5
Twitter Attack No.4




                      6
Twitter Attack No.5




                      7
Twitter Attack No.6




                      8
Twitter Attack No.7




                      9
Twitter Attack No.8




                      10
Twitter Attack No.9




                      11
Twitter Attack No.10




                       12
Twitter Attack No.11




                       13
Twitter Attack No.12




                       14
Twitter Attack No.13




                       15
16

Contenu connexe

Tendances

Lessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SFLessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Pek Pongpaet
 
Storybird - Making Your Story Public
Storybird  - Making Your Story PublicStorybird  - Making Your Story Public
Storybird - Making Your Story Public
Reba Gordon Matthews
 

Tendances (20)

Lessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SFLessons Learned Launching Pinstagram - iOS Monthly Meetup SF
Lessons Learned Launching Pinstagram - iOS Monthly Meetup SF
 
Brian Patterson - ICPHSO 2015 - Social Media & Recalls
Brian Patterson - ICPHSO 2015 - Social Media & RecallsBrian Patterson - ICPHSO 2015 - Social Media & Recalls
Brian Patterson - ICPHSO 2015 - Social Media & Recalls
 
How to use ifttt slides
How to use ifttt slidesHow to use ifttt slides
How to use ifttt slides
 
The positive effects technology has on our lives
The positive effects technology has on our livesThe positive effects technology has on our lives
The positive effects technology has on our lives
 
Pivotal tracker
Pivotal trackerPivotal tracker
Pivotal tracker
 
9 Best Practices in Social for Franchises
9 Best Practices in Social for Franchises9 Best Practices in Social for Franchises
9 Best Practices in Social for Franchises
 
Elixir in Production
Elixir in ProductionElixir in Production
Elixir in Production
 
Geetramayan slideshare app
Geetramayan slideshare appGeetramayan slideshare app
Geetramayan slideshare app
 
Storybird - Making Your Story Public
Storybird  - Making Your Story PublicStorybird  - Making Your Story Public
Storybird - Making Your Story Public
 
Twitmusic
TwitmusicTwitmusic
Twitmusic
 
2014 Email Evolution Conference Closing Keynote Presentation
2014 Email Evolution Conference Closing Keynote Presentation2014 Email Evolution Conference Closing Keynote Presentation
2014 Email Evolution Conference Closing Keynote Presentation
 
Twitter Api 번역계획서
Twitter Api 번역계획서Twitter Api 번역계획서
Twitter Api 번역계획서
 
How to get maximum from Magento community
How to get maximum from Magento community How to get maximum from Magento community
How to get maximum from Magento community
 
K8 2015: Welcome Presentation by Ted Krantz
K8 2015: Welcome Presentation by Ted KrantzK8 2015: Welcome Presentation by Ted Krantz
K8 2015: Welcome Presentation by Ted Krantz
 
18+ Ways To Help Clients Love You
18+ Ways To Help Clients Love You18+ Ways To Help Clients Love You
18+ Ways To Help Clients Love You
 
Why live streaming is becoming crucial in a social media strategy? Social Med...
Why live streaming is becoming crucial in a social media strategy? Social Med...Why live streaming is becoming crucial in a social media strategy? Social Med...
Why live streaming is becoming crucial in a social media strategy? Social Med...
 
Defending yourself from the internet
Defending yourself from the internetDefending yourself from the internet
Defending yourself from the internet
 
The ABCs of Twitter Analytics
The ABCs of Twitter Analytics The ABCs of Twitter Analytics
The ABCs of Twitter Analytics
 
SMAC- Facebook Analytics
SMAC- Facebook AnalyticsSMAC- Facebook Analytics
SMAC- Facebook Analytics
 
Twitter part 2: WHO follows ME?
Twitter part 2: WHO follows ME?Twitter part 2: WHO follows ME?
Twitter part 2: WHO follows ME?
 

Plus de Kim Jensen

Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
Kim Jensen
 

Plus de Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Twitter Attacks