@Pinboard we do. they're called CVEs.
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard ha! just imagine how many years it would take a team of 6 self-appointed neckbeards (and 3 ruby guys) to come up with that list!Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard I can never keep track of whether we're on -gate, -ghazi, or -pocalypse.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard@McGrewSecurity Then we’ll have the issue of thinking that girl names are weaker and less scarier. See: http://wapo.st/1qq2zGgThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard@ade_oshineye The first would then aptly be named... "Apple". Sounds like a plan to me.#SecurityThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard I cannot wait for Tropical Kernel Exploit Bob to hit the news!Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
RT
@Pinboard: We should name serious security vulnerabilities like hurricanes (from alphabetical list of names) to avoid bug branding warsThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.