Skip to content
  • Home Home Home, current page.
  • Moments Moments Moments, current page.

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @
  • Language: English
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English UK
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log in
    Have an account?
    · Forgot password?

    New to Twitter?
    Sign up
mikefarb1's profile
MikeFarb
MikeFarb
MikeFarb
@mikefarb1

Tweets

MikeFarb

@mikefarb1

Bookmark us at http://www.unhackthevote.com  Follow us on Facebook at http://www.facebook.com/unhackthevote.org … To Help us out visit http://www.unhackthevote.com 

What Happened in the Election?
unhackthevote.com
Joined February 2010

Tweets

  • © 2020 Twitter
  • About
  • Help Center
  • Terms
  • Privacy policy
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @

Promote this Tweet

Block

  • Tweet with a location

    You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.

    Preview

    Why you're seeing this ad

    Log in to Twitter

    · Forgot password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log in »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Welcome home!

    This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.

    Tweets not working for you?

    Hover over the profile pic and click the Following button to unfollow any account.

    Say a lot with a little

    When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.

    Spread the word

    The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.

    Join the conversation

    Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.

    Learn the latest

    Get instant insight into what people are talking about now.

    Get more of what you love

    Follow more accounts to get instant updates about topics you care about.

    Find what's happening

    See the latest conversations about any topic instantly.

    Never miss a Moment

    Catch up instantly on the best stories happening as they unfold.

    1. MikeFarb‏ @mikefarb1 21 Jan 2018

      Remember when the emails of John Podesta, Colin Powell, and the DNC were compromised in 2016? This happened because the fell prey to a phishing attack. In Podesta's case, he logged onto what he believed was his gmail account and changed his password.

      3 replies 229 retweets 417 likes
      Show this thread
    2. MikeFarb‏ @mikefarb1 21 Jan 2018

      Even his own IT staff was fooled by this email! The attackers used the passwords he entered to gain access to his real gmail account. https://www.cbsnews.com/news/the-phishing-email-that-hacked-the-account-of-john-podesta/ …pic.twitter.com/K5wCiemnMv

      6 replies 181 retweets 317 likes
      Show this thread
    3. MikeFarb‏ @mikefarb1 21 Jan 2018

      Regular phishing is one thing, but spear phishing is even more pernicious and hard to detect Unlike regular phishing, spear phishing messages appear to come from a trusted source - likely an individual within the recipient's own company or from someone the target knows personallypic.twitter.com/SMxOP8ywF2

      2 replies 178 retweets 300 likes
      Show this thread
    4. MikeFarb‏ @mikefarb1 21 Jan 2018

      When you click on the link in a spear phishing email the payload is delivered - a file is downloaded containing a Trojan Horse. This file gives the attacker access to anything on your computer, including your personal data, your emails, and your email address book.pic.twitter.com/gWDtaIiouX

      3 replies 175 retweets 294 likes
      Show this thread
    5. MikeFarb‏ @mikefarb1 21 Jan 2018

      The success of spear phishing depends upon three things: The source must appear to be a known and trusted individual; there is information within the message that supports its validity, and the request seems to have a logical basis.pic.twitter.com/uqTbohlK3L

      5 replies 136 retweets 278 likes
      Show this thread
    6. MikeFarb‏ @mikefarb1 21 Jan 2018

      What can the attackers do with the information they collect? Well they can certainly make your private communications public, as was the case of the hacked DNC emails in 2016.

      1 reply 96 retweets 241 likes
      Show this thread
    7. MikeFarb‏ @mikefarb1 21 Jan 2018

      Alternatively they can use this information to blackmail you, or even to blackmail others who have shared their private thoughts or data with you.

      2 replies 94 retweets 234 likes
      Show this thread
    8. MikeFarb‏ @mikefarb1 21 Jan 2018

      But what else? A successful spear phishing attempt is the gift that keeps giving, from the attacker's point of view. Once the attackers have your address book and your past emails it becomes very, very easy to impersonate you or those you communicate with.

      3 replies 112 retweets 249 likes
      Show this thread
    9. MikeFarb‏ @mikefarb1 21 Jan 2018

      For instance, an attacker might spoof an email from you to your colleagues, asking them click on a link in order to review a document you are working on. Because of this, a successful spear phishing attempt endangers your contacts and people you are close to.

      1 reply 93 retweets 238 likes
      Show this thread
    10. MikeFarb‏ @mikefarb1 21 Jan 2018

      You can prevent being the victim of a spear phishing attack by:

      2 replies 104 retweets 224 likes
      Show this thread
      MikeFarb‏ @mikefarb1 21 Jan 2018

      Never clicking a link to a service that you use that is sent via email. If you get a realistic-looking email from your bank, PayPal, Ebay or your email provider, make sure you log into your account via your browser, NOT by clicking the link you were sent.

      11:50 AM - 21 Jan 2018
      • 613 Retweets
      • 908 Likes
      • FindingHopeInKS Robert ✊Not Me Us💪 Willis Tears of Joy!!! Team #46 Bleudrift Susan Risso 🌊Monique S♊❤️🌊 Betsy W Hawkeye #WearAMask‼️#BidenHarris2020 Standup4all
      32 replies 613 retweets 908 likes
        1. New conversation
        2. MikeFarb‏ @mikefarb1 21 Jan 2018

          If someone you know sends you a link to a specific page or document, check in with that person via a new email, or by phone or by text, to verify that that person did indeed send you a link.

          8 replies 221 retweets 401 likes
          Show this thread
        3. MikeFarb‏ @mikefarb1 21 Jan 2018

          What could happen if a candidate or politician holding office were compromised by a spear phishing attack? How far could it spread? How do we know that hasn't already happened?

          2 replies 123 retweets 289 likes
          Show this thread
        4. MikeFarb‏ @mikefarb1 21 Jan 2018

          Perhaps it already has. http://thehill.com/policy/cybersecurity/369473-russian-hackers-move-to-new-political-targets …pic.twitter.com/oRZ4aTDEr4

          11 replies 314 retweets 394 likes
          Show this thread
        5. MikeFarb‏ @mikefarb1 21 Jan 2018

          Are there things that we see going on in Gov’t right now could be the result of a Spear phishing attack? We believe there is. We've been working on a very important finding. This thread is our lead in to that piece. We are under attack. We have to protect ourselves.

          9 replies 212 retweets 483 likes
          Show this thread
        6. MikeFarb‏ @mikefarb1 21 Jan 2018

          If you would like to help fund our workhttp://www.unhackthevote.com 

          13 replies 252 retweets 401 likes
          Show this thread
        7. End of conversation
        1. TJ  🎶Shark 🦈Dog 🎶‏ @Z06TomCat 21 Jan 2018
          Replying to @mikefarb1

          Great advice!

          0 replies 3 retweets 9 likes
          Thanks. Twitter will use this to make your timeline better. Undo
          Undo
        1. TrumpDumpster‏ @caschmitt 21 Jan 2018
          Replying to @mikefarb1

          Thank you, Mike. Once again, you’ve made us aware of Russia’s attack on US!

          0 replies 10 retweets 46 likes
          Thanks. Twitter will use this to make your timeline better. Undo
          Undo
        1. винзала‏ @VinZala 21 Jan 2018
          Replying to @mikefarb1

          The only solid advice here is to use 2 factor authentication, such as the Google authenticator app. This will keep an account safe even after a password is compromised.

          0 replies 5 retweets 15 likes
          Thanks. Twitter will use this to make your timeline better. Undo
          Undo
        1. New conversation
        2. Lovely Rita (@ 🏠)‏ @LovelyRita1022 21 Jan 2018
          Replying to @mikefarb1

          Just got one from Apple this morning (1/21/18) saying I had 2 IP addresses & I needed to click the button to get help!

          3 replies 1 retweet 4 likes
        3. nancychando‏ @nancychando26 21 Jan 2018
          Replying to @LovelyRita1022 @mikefarb1

          I got one from Apple once too.

          0 replies 0 retweets 0 likes
        4. End of conversation

      Loading seems to be taking a while.

      Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

        Promoted Tweet

        false

        • © 2020 Twitter
        • About
        • Help Center
        • Terms
        • Privacy policy
        • Cookies
        • Ads info