Noura N. Alomar (@noura_7n) 's Twitter Profile
Noura N. Alomar

@noura_7n

PhD in Computer Science @Berkeley_EECS | Academic researcher | Research interests: Computer Security, Usable Security and Privacy, and Software Engineering

ID: 198510860

calendar_today04-10-2010 14:23:27

672 Tweet

710 Followers

3,3K Following

Noura N. Alomar (@noura_7n) 's Twitter Profile Photo

Are you a lawyer advising mobile app developers on privacy and security matters? If so, plz help us learn about the types of privacy guidance you provide to developers by participating in our anonymous research survey: berkeley.qualtrics.com/jfe/form/SV_5A… If not, plz retweet! #GDPR #CCPA

Abraham Mhaidli (@abrahammhaidli) 's Twitter Profile Photo

Hi all! We are conducting a study looking at how software developers use ethical frameworks in their day-to-day jobs. See attached flyer for details. Please spread the word and/or consider participating if eligible!

Hi all! We are conducting a study looking at how software developers use ethical frameworks in their day-to-day jobs. See attached flyer for details. Please spread the word and/or consider participating if eligible!
Faisal Nawab | فيصل نواب (@faisalsyn) 's Twitter Profile Photo

هل أنت طالب في جامعة الملك فهد (KFUPM)؟ هل عندك رغبة تشارك في مشاريع بحثية؟ أنا و الدكتور محمد فلمبان حنعمل برنامج بحثي لطلبة البكالوريس بين جامعة البترول و جامعة كاليفورنيا ارفاين سجل للبرنامج من هنا: docs.google.com/forms/d/e/1FAI… #kfupm #research

هل أنت طالب في جامعة الملك فهد (KFUPM)؟ 
هل عندك رغبة تشارك في مشاريع بحثية؟

أنا و الدكتور محمد فلمبان حنعمل برنامج بحثي لطلبة البكالوريس بين جامعة البترول و جامعة كاليفورنيا ارفاين

سجل للبرنامج من هنا: 
docs.google.com/forms/d/e/1FAI…

#kfupm #research
Justus Mattern (@matternjustus) 's Twitter Profile Photo

The only piece of advice I give to undergrads that want to get into research is to cold email PhD students with a good track record. Most undergrads are bottlenecked by research ideas whereas good PhD students have way too many ideas that they cannot execute. If you can code

Tom Dörr (@tom_doerr) 's Twitter Profile Photo

Slidev: A Markdown-based presentation tool that lets you create interactive slides using Vue components, with features like live coding, LaTeX support, andexport options to various formats

Slidev: A Markdown-based presentation tool that lets you create interactive slides using Vue components, with features like live coding, LaTeX support, andexport options to various formats
Arvind Narayanan (@random_walker) 's Twitter Profile Photo

Something I've observed in academia but I suspect is true in industry as well: as you become more senior, you'll find that you can be much more productive if you spend all your time being a manager and letting junior people do all the real work. But after a few years of this,

Orin Kerr (@orinkerr) 's Twitter Profile Photo

You have a right to remain silent. Silence itself—the thing one declines to say, or is forbidden to name, the discretion that is required between different speakers—is less the absolute limit of discourse, the other side from which it is separated by a strict boundary, than an

Basel Alomair (@baselalomair) 's Twitter Profile Photo

إذا كنت تحب البحث العلمي وترغب في عمل بحوث متقدمة في التشفير مع أفضل علماء التشفير على مستوى العالم (أو تعرف شخص مهتم) الرجاء التواصل على الخاص. انشروها رجاءً حتى تعم الفائدة 🙏🏻

Bill Marczak (@billmarczak) 's Twitter Profile Photo

Update your iPhones.. again! iOS 18.3.1 out today with a fix for an ITW USB restricted mode bypass (via Accessibility) support.apple.com/en-us/122174

Update your iPhones.. again!  iOS 18.3.1 out today with a fix for an ITW USB restricted mode bypass (via Accessibility) support.apple.com/en-us/122174
Black Hat (@blackhatevents) 's Twitter Profile Photo

The #BHUSA Call for Tools is open. Submit your proposal for the opportunity to present your open-source tool to the Black Hat community before March 17. Submit today >> bit.ly/3u0md9h

The #BHUSA Call for Tools is open. Submit your proposal for the opportunity to present your open-source tool to the Black Hat community before March 17. Submit today >> bit.ly/3u0md9h
Chris Hoofnagle (@hoofnagle) 's Twitter Profile Photo

I'm giving the Saudi Aramco Cybersecurity chair seminar tonight (10 PM Pacific) on teaching cybersecurity and the intersection of quantum technologies with cyber

I'm giving the Saudi Aramco Cybersecurity chair seminar tonight (10 PM Pacific) on teaching cybersecurity and the intersection of quantum technologies with cyber
Zach Edwards (@thezedwards) 's Twitter Profile Photo

Today the world has learned the name of an advertising company who has been tracking ~1.3 billion people per month via their access to the global advertising bid stream and selling that data via a subsidiary they own.

Reyhan (@reyhaneh) 's Twitter Profile Photo

We have opened the call for application to UIUC+ Summer Research Program for undergrads: go.illinois.edu/UIUCPlus-SRP. Please apply or spread the words. The mentors are 12 UIUC PLSE professors/alumni. The (soft) deadline is February 28th, where we start reviewing the applications.

Black Hat (@blackhatevents) 's Twitter Profile Photo

Join us for the inaugural AI Summit at #BHASIA on Wednesday, April 2, at Marina Bay Sands. This exciting one-day event will bring together leading experts in cybersecurity and artificial intelligence, offering a unique opportunity to explore the dynamic intersection of these

Join us for the inaugural AI Summit at #BHASIA on Wednesday, April 2, at Marina Bay Sands. This exciting one-day event will bring together leading experts in cybersecurity and artificial intelligence, offering a unique opportunity to explore the dynamic intersection of these
SDAIA (@sdaia_sa) 's Twitter Profile Photo

#سدايا تدعو العموم والجهات المعنية إلى المشاركة في إبداء مرئياتهم حيال مشروع تعديلات اللائحة التنفيذية لنظام حماية البيانات الشخصية من خلال الرابط الآتي: istitlaa.ncc.gov.sa/ar/Transportat…

#سدايا تدعو العموم والجهات المعنية إلى المشاركة في إبداء مرئياتهم حيال مشروع تعديلات اللائحة التنفيذية لنظام حماية البيانات الشخصية من خلال الرابط الآتي:

istitlaa.ncc.gov.sa/ar/Transportat…
Ron Masas (@ronmasas) 's Twitter Profile Photo

If you can’t code, you will never find vulnerabilities. Or to be fair, you’ll never find the ones that matter. You’ll hit a ceiling in vulnerability research. Sure, you can rack up CTF points, follow step-by-step blog posts, land a bug bounty once in a while, or even go viral on

HackerOne (@hacker0x01) 's Twitter Profile Photo

Tomorrow, June 12, Zoom's Bug Bounty Operations Manager Clara Andress joins HackerOne’s CPO Nidhi Aggarwal & Deputy CISO Blake Entrekin to talk about defense in depth to keep up with nonstop code changes and AI-driven threats. Drawing on new ESG data and their wealth of field

Tomorrow, June 12, <a href="/Zoom/">Zoom</a>'s Bug Bounty Operations Manager Clara Andress joins HackerOne’s CPO Nidhi Aggarwal &amp; Deputy CISO Blake Entrekin to talk about defense in depth to keep up with nonstop code changes and AI-driven threats. 

Drawing on new ESG data and their wealth of field