ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 28 days agoObvious cybersecurity rulelemmy.worldimagemessage-square36fedilinkarrow-up1322
arrow-up1322imageObvious cybersecurity rulelemmy.worldZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 28 days agomessage-square36fedilink
minus-squareuriel238@lemmy.blahaj.zonelinkfedilinkarrow-up26·edit-227 days agoTo this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations. The weakest security link is between chair and keyboard.
To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.
The weakest security link is between chair and keyboard.