Discover and read the best of Twitter Threads about #CybersecurityAwarenessMonth

Most recents (9)

How_To_Became a Great #hacker

1. Learn TCP/IP, Basic Information
gathering, Proxies, Socks, SSL, VPN, VPS, RDP,
FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows - You can do
this using vmware or any virtual desktop
3. Learn a programming language that's
compatible with all OS - Perl, Python, C, ASM
4. Learn HTML, PHP, Javascript, ASP, XML, SQL,
5. Learn Reverse engineering and crack
some programs for serials easy ones like
mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp,
pop3, 80, 8080 - Pick some free software
like ftp server, mail server, apache or iis
webserver or a webserver all-in-one pack,
or teamspeak, ventrilo, mumble.
Read 18 tweets
#CybersecurityAwarenessMonth Tip of the Day:

Start an email account where employees can send their questions on any and all things cybersecurity provides a good start and has multiple benefits. πŸ‘‡

🧡 (1/7) Image
#NCSAM Tip of the Day:

Use a fake security question. It’s important to not use common questions that anyone can find out by looking into your past history. Also, get creative with it, treat security answers like passwordsβ€”the more obscure, the better.

(2/7) Image
#NCSAM Tip of the Day:

Where should you use MFA?
1. On accounts with your financial info like banks, or online stores
2. On accounts with personal info, like social media
3. On accounts with info you use for work

TLDR: Use MFA everywhere!


Read 3 tweets
Is Bank of #SouthSudan offering rewards to its visitors?
Here is what i found
#Thread 1/10

#SSOT #CyberSecurity #CybersecurityAwarenessMonth
please retweet
When i try to visit https://www.mp3juices[.]cc
(Free music downloading site)
There is a malicious ad that pops up at the top
When I go ahead and click on that ad in an isolated environment.I am presented with the screen below claiming that i have won $300,000 reward from Bank of #SouthSudan
Read 10 tweets
General #CyberSecurity policies

General security policies affecting an employee using the internet are as follows:
#SSOT #CybersecurityAwarenessMonth
Social media networks/applications

Many people have social media accounts, such as Twitter, Facebook, Instagram etc.These sites store personal details about everyone who has an account, and employees need to be careful with the information that they post on these sites.
Cognitive hacking
This is where a computer system attack relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is a social engineering attack and the information required could be found on your various social media websites.
Read 7 tweets
πŸ’‰πŸ“² On Oct. 22, Ontario is set to launch a new vaccine certificate and verification app. Receipts will be available in the form of QR codes. In the coming months, Ontario will also release another credential called Digital ID. I asked experts about usability and security. [1/12]
Some vaccination-credential apps have been criticized for how they handle users’ information (see the private PORTpass app:…) but generally, cybersecurity experts say systems like Quebec's (similar to what Ontario is doing) should be secure. [2/12]
Ontario has not publicized the source code for its app yet, but as @BrockUniversity professor of digital media @onthename explains, it's likely the QR codes will contain unique URLs that will interface with the app to check users' vaccination status in a govt. database. [3/12]
Read 13 tweets

Do yourself a favour and learn to hack🐞.

You just have to START!🏁, you will be good in no time⏱️.

/ A mega threadπŸ§΅πŸ‘‡

Here are a few resources for you to get started.
#cybersecurity #CyberAttack #infosec #hacker
Also, please note that I'm not a professional hacker or pentester. I'm still learning to be, so these are the resources I have found useful along my journey.

1) Basic IT skills.πŸ‘ΆπŸΌ
If you are brand new to IT, I strongly recommend this course.
This is a FREE course by Professor Messer –…
Read 24 tweets
If u come across a tempting link,
No harm in analysing it at @virustotal (

It will take u few seconds but will assure a safer online experience.


PS: important when u receive a shortened link (e.g.
Imagine same key 4 all the locks - loose the key and u loose the access.

This applies to passwords/passphrases as well

Use separate passwords/passphrases for different logins

Consider a password manager e.g. @LastPass

Set the system (PC/mac/smartphone) to update "automatically"


@WindowsUpdate @linuxfoundation @Apple
Read 15 tweets
As part of #CyberSecurityAwarenessMonth, what are Security Design Principles that you know of? In a couple of hours I will proceed to describe the most important ones in a tweet each. Would love to see what you know about them!
1. Minimize Attack Surface:
Your surface should be closed by design. Open ports based on need, not because it's nicer to have multiple ports open. This is production, not testing.
Remove assets that were removed. Keep a checklist (QA - sign off for validation).
2. Least Privilege:
If A shouldn't do X, they are not *granted* X. Starting with an empty slate and going up is better than the opposite, yet harder. Make sure that the user has the requirements to do their job.
If app needs 60% CPU to be safe, then that is given. Same for users
Read 11 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!