twitter security
TRANSCRIPT
The Frontier ofTwitter
1) Early Adopters/Experimenters2) Utilizers/Sneezers3) Widespread Use4) Hackers and Spammers move in
Evolution of Major Technologies
Bad Security=Bad Reputation
Bad Reputation=Missed Connections
When you follow someone ...
DM me sometime!Don't mind if I do.By: Townend Photography
I have a treat for you.
Most Common URL Shorteners:tinyurl.com, bit.ly, j.mp, su.pr, ow.ly, tr.im, is.gd, twitpic.com
Tools to check URLS:
Tweetdeck
PowerTwitter for FireFox(You use FireFox right?)
Characteristics of Worm Messages: Ambiguous
Invite you to a quiz
Contain a leading question
What to Do Step 1
What to Do Step 2
Where do worms come from?
Back in the Good ol' Days (a year ago) ...
Oauth to the rescue! (sort of)
Oauth = Permanent Pipe to your account
Rule: When in doubt, revoke.
Action Steps1) Inform users they are hacked
2) Don't click on strange links (no, seriously don't)
3) Oauth = better, username/password = not so good
4) Set SocialToo.com filters