ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 1 year agoObvious cybersecurity ruleimagemessage-square8linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageObvious cybersecurity ruleZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 1 year agomessage-square8linkfedilink
minus-squareUriel238 [all pronouns]@lemmy.blahaj.zonelinkfedilinkarrow-up1·edit-21 year agoTo this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations. The weakest security link is between chair and keyboard.
To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.
The weakest security link is between chair and keyboard.