ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 5 months agoObvious cybersecurity rulelemmy.worldimagemessage-square36fedilinkarrow-up1323
arrow-up1323imageObvious cybersecurity rulelemmy.worldZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 5 months agomessage-square36fedilink
minus-squareUriel238 [all pronouns]@lemmy.blahaj.zonelinkfedilinkarrow-up26·edit-25 months agoTo this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations. The weakest security link is between chair and keyboard.
To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.
The weakest security link is between chair and keyboard.