ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 5 months agoObvious cybersecurity rulemessage-squaremessage-square21fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1message-squareObvious cybersecurity ruleZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 5 months agomessage-square21fedilink
minus-squareUriel238 [all pronouns]@lemmy.blahaj.zonelinkfedilinkarrow-up6·edit-25 months agoTo this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations. The weakest security link is between chair and keyboard.
To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.
The weakest security link is between chair and keyboard.