Twitter Security

download Twitter Security

If you can't read please download the document

Transcript of Twitter Security

The Frontier ofTwitter

1) Early Adopters/Experimenters2) Utilizers/Sneezers3) Widespread Use4) Hackers and Spammers move in

Evolution of Major Technologies

Bad Security=Bad Reputation

Bad Reputation=Missed Connections

When you follow someone ...

DM me sometime!Don't mind if I do.By: Townend Photography

I have a treat for you.

Most Common URL Shorteners:tinyurl.com, bit.ly, j.mp, su.pr, ow.ly, tr.im, is.gd, twitpic.com

Tools to check URLS:

Tweetdeck

PowerTwitter for FireFox(You use FireFox right?)

Characteristics of Worm Messages: Ambiguous

Invite you to a quiz

Contain a leading question

What to Do Step 1

What to Do Step 2

Where do worms come from?

Back in the Good ol' Days (a year ago) ...

Oauth to the rescue! (sort of)

Oauth = Permanent Pipe to your account

Rule: When in doubt, revoke.

Action Steps1) Inform users they are hacked

2) Don't click on strange links (no, seriously don't)

3) Oauth = better, username/password = not so good

4) Set SocialToo.com filters