Attacks/Breaches

12/18/2015
03:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

10 Funny Twitter Feeds For Security Geeks

These must-follow Twitter feeds offer plenty of cybersecurity humor to keep infosec pros giggling even when the attacks keep coming.
Previous
1 of 11
Next

Let’s face it—information security isn’t inherently the most humorous field in the world. While the subject matter might elicit more laughs than something like periodontal dentistry, odds are it wasn’t the potential yuks that drew you to the profession. But like paramedics, morticians, and other professionals used to dealing with traumatic situations, infosec pros tend to be a pretty funny bunch of folks--even if the humor runs a little black.

Because in spite of the frustration and long hours, there’s a lot that is really hilarious about security, as long as you look at it in the right way. We’ve rounded up ten of the funniest security-related Twitter accounts that do just that. Their posts range from the daily face palm variety all the way up to some pretty strange high-concept stuff. Either way, it'll help you keep your sanity intact through some healthy exercise of the funny bone. 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/29/2015 | 9:50:40 AM
Re: #HackerPickupLines
@Joe. Ha not much of a Taylor Swift fan myself either. It would be comical to hear cloud computing around Katy Perry lyrics.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
12/24/2015 | 7:15:12 PM
Re: #HackerPickupLines
I've been aware of the Taylor Swift Infosec account for some time; a friend and colleague of mine is really into it and frequently reposts those items.  They're pretty funny -- although I'm not much of a Taylor Swift fan.

Now if only somebody would combine Katy Perry lyrics and cloud computing.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/24/2015 | 7:13:52 PM
NSAPR
The NSA PR account reminds me of a phone prank somebody pulled on the NSA shortly after the Snowden news broke.  Somebody called the NSA claiming that they had accidentally deleted some important emails and asked to speak to someone about getting those emails back from the NSA's purported backups.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/23/2015 | 2:43:36 PM
#HackerPickupLines
Some of these were quite comical. I feel like my fiance would love SecuriTay.
DougA987
50%
50%
DougA987,
User Rank: Apprentice
12/23/2015 | 2:44:38 AM
@nihilsec
This account is non-existant at present
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8903
PUBLISHED: 2019-02-18
index.js in Total.js Platform before 3.2.3 allows path traversal.
CVE-2019-6453
PUBLISHED: 2019-02-18
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
CVE-2019-8372
PUBLISHED: 2019-02-18
The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link an...
CVE-2019-8902
PUBLISHED: 2019-02-18
An issue was discovered in idreamsoft iCMS through 7.0.14. A CSRF vulnerability can delete users' articles via the public/api.php?app=user URI.
CVE-2019-8423
PUBLISHED: 2019-02-18
ZoneMinder through 1.32.3 has SQL Injection via the skins/classic/views/events.php filter[Query][terms][0][cnj] parameter.