Jen (@jjwilliamscyber) 's Twitter Profile
Jen

@jjwilliamscyber

Lecturer in Cyber Security Studies at Macquarie University. Privacy is a human right. The future is open source. Opinions are my own.

ID: 1475290794844037125

linkhttps://researchers.mq.edu.au/en/persons/jennifer-williams calendar_today27-12-2021 02:22:06

207 Tweet

86 Followers

163 Following

Jen (@jjwilliamscyber) 's Twitter Profile Photo

This visual narrative tool (using breach data from HaveIBeenPwned) can give you an idea of how much of your data is out there and where it came from. #CyberSecurity #dataprivacy abc.net.au/news/2023-05-1โ€ฆ

Alexander Leslie (@aejleslie) 's Twitter Profile Photo

๐Ÿ”’ Operation Cronos ๐Ÿ”’ - 34 servers seized. - 2 LockBit actors arrested. - 3 arrest warrants issued. - 5 indictments issued. - 200 cryptocurrency accounts frozen. - 14,000 โ€œrogue accounts responsible for exfiltration or infrastructureโ€ closed. - Decryption tool released.

Andy Greenberg (@agreenberg at the other places) (@a_greenberg) 's Twitter Profile Photo

Signal is rolling out new settings today to finally let you create a username instead of revealing your phone number to everyone you communicate with. This is probably the most requested feature in Signalโ€™s 10-year history. I tested it out in beta: wired.com/story/signal-lโ€ฆ

Andrew Couts (@andrewcouts) 's Twitter Profile Photo

NEW: A leaked document reveals the locations of ShotSpotter microphones around the globe, which have been kept secret from both the police that use the system and the public. Dhruv Mehrotra and Joey Scott have the scoop: wired.com/story/shotspotโ€ฆ

WIRED (@wired) 's Twitter Profile Photo

EXCLUSIVE: A WIRED analysis of data leaked from the surveillance company formerly known as Shotspotter reveals the secret locations of 25,580 gunshot detection microphones. Check our interactive map to see if there's a sensor mounted near you. wired.trib.al/AdG6sVO

Jen (@jjwilliamscyber) 's Twitter Profile Photo

I like to start all my classes with โ€œcyber newsโ€ and โ€” between the #LockBit arrests and domain capture, and the #iSoon and #ShotSpotter data leaks โ€” its been an interesting week in cybersecurity to say the least.

Security Studies @ MQ (@ssc_mq) 's Twitter Profile Photo

Meet our Staff: Jennifer J Williams. Jen is a Lecturer in Cyber Security Analysis specialising in Behavioural Cybersecurity. She is Chief Primary Investigator on a project examining public support for kinetic responses to large scale cyber-attacks and cyberwarfare.

Meet our Staff: Jennifer J Williams. <a href="/jjwilliamscyber/">Jen</a> is a Lecturer in Cyber Security Analysis specialising in Behavioural Cybersecurity. She is Chief Primary Investigator on a project examining public support for kinetic responses to large scale cyber-attacks and cyberwarfare.
Defence Connect (@defenceconnect) 's Twitter Profile Photo

A huge round of applause for Jennifer Williams from Macquarie University for winning Best Cyber Technician or Specialist Under 35! #DefenceandNationalSecurityWorkforceAwards Jen

A huge round of applause for Jennifer Williams from Macquarie University for winning Best Cyber Technician or Specialist Under 35! #DefenceandNationalSecurityWorkforceAwards 

<a href="/jjwilliamscyber/">Jen</a>
Security Studies @ MQ (@ssc_mq) 's Twitter Profile Photo

Congratulations to SSC Lecturer Jennifer Williams Jen who was awarded Best Cyber Technician or Specialist Under 35 for the 2024 Defence Connect Defence and National Security Workforce Awards! An amazing achievement!

Congratulations to SSC Lecturer Jennifer Williams <a href="/jjwilliamscyber/">Jen</a> who was awarded  Best Cyber Technician or Specialist Under 35 for the 2024 Defence Connect Defence and National Security Workforce Awards! An amazing achievement!
Jen (@jjwilliamscyber) 's Twitter Profile Photo

I am so pleased to share that I was nominated the Best Cyber Technician or Specialist Under 35 at the #DefenceandNationalSecurityWorkforceAwards #CyberSecurity #academia

I am so pleased to share that I was nominated the Best Cyber Technician or Specialist Under 35 at the #DefenceandNationalSecurityWorkforceAwards 

#CyberSecurity #academia
Jeremy Kirk (@jeremy_kirk) 's Twitter Profile Photo

Here's CrowdStrike's advice if hosts are crashing: 1. Boot Windows into Safe Mode or the Windows Recovery Environment 2. Navigate to the C:\Windows\System32\drivers\CrowdStrike directory 3. Locate the file matching โ€œC-00000291*.sysโ€, and delete it. 4. Boot the host normally.

Tom Warren (@tomwarren) 's Twitter Profile Photo

BREAKING: a major Windows BSOD issue has taken banks, airlines, and broadcasters offline. A faulty CrowdStrike update is wreaking havoc worldwide and causing boot loops. Full details below ๐Ÿ‘‡ theverge.com/2024/7/19/2420โ€ฆ