ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 6 months agoObvious cybersecurity rulelemmy.worldimagemessage-square35fedilinkarrow-up1326arrow-down10
arrow-up1326arrow-down1imageObvious cybersecurity rulelemmy.worldZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 6 months agomessage-square35fedilink
minus-squareUriel238 [all pronouns]@lemmy.blahaj.zonelinkfedilinkarrow-up26·edit-26 months agoTo this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations. The weakest security link is between chair and keyboard.
To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.
The weakest security link is between chair and keyboard.