Social Networks

Beware of Evil Facebook Groups

Some of my Facebook friends are probably wondering why I would fall into the trap of the magical “dislike button” hype that seems to be sweeping across Facebook right now.  In a little social experiment and hopefully an awareness exercise for some of my non-security friends I created a Facebook group based off of similar […]

Beware of Evil Facebook Groups Read More »

Enterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social Media Policies

This is the final article in my series on Enterprise Open Source Intelligence Gathering.  This information relates to the main topics from my presentation that I am giving this week at the 7th Annual Ohio Information Security Summit.  For more background information, see part one.  If you missed part two (blogs, message boards and metadata)

Enterprise Open Source Intelligence Gathering – Part 3 Monitoring and Social Media Policies Read More »

Enterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards and Metadata

This post is part two of my three part series on Enterprise Open Source Intelligence Gathering.  This information relates to the presentation that I am giving this week at the 7th Annual Ohio Information Security Summit.  For more background information, see part 1.  Part three will be about putting together a simple monitoring program/toolkit and

Enterprise Open Source Intelligence Gathering – Part 2 Blogs, Message Boards and Metadata Read More »

Enterprise Open Source Intelligence Gathering – Part 1 Social Networks

UPDATE: You can now download my slide deck from SlideShare. Next week I will be speaking at the 7th Annual Ohio Information Security Summit on “Enterprise Open Source Intelligence Gathering”.  Here is the talk abstract: What does the Internet say about your company?  Do you know what is being posted by your employees, customers, or

Enterprise Open Source Intelligence Gathering – Part 1 Social Networks Read More »

Old News: Twitter can be used for Botnet Command & Control

Shocking but true…today a researcher discovered that Twitter has been used for command and control of a botnet which may have been used by Brazilian hackers to steal online banking login information.  Kudos to the researcher, Jose Nazario, who found this.  It was an interesting read to say the least.  The bot would basically look

Old News: Twitter can be used for Botnet Command & Control Read More »