So, what happens if you create the MD5 hash of a common password, and then use the hash as a Google search term?
#cybersecurity #pentesting #encryption #deepweb #darkweb #hacking
A Laptop With 6 Of The Most Destructive Malware Threats Ever Is Up For Auction
#cybersecurity #malware #art
https://www.forbes.com/sites/curtissilver/2019/05/15/malware-laptop-auction-chaos/
Netgear router log message:
"Self2WAN ICMP type b Detected!"
Does anyone know what it means? I can find all kinds of forums where people are guessing, but I can't find any definitive documentation.
#cybersecurity
FIFO Networks is pleased to announce that we don't use the ConnectWise remote connection software. Our clients were never at risk.
#Ransomware #ransomwareprotection #Malware #cybersecurity
https://www.zdnet.com/article/gandcrab-ransomware-gang-infects-customers-of-remote-it-support-firms/
It was very nice of @Google to send me this security alert - on November 16, 2018. Notice the date in the message.
#FAIL #cybersecurity #Sarcasm
The number one attack vector is social engineering.
The number one vulnerability is authentication.
"Any change in a digital business process will introduce one or more new security vulnerabilities."
--Young's Axiom of Cybersecurity
This means that the process of creating business change must include a process for identifying new risks.
#businessstrategy #cybersecurity #changemanagement https://counter.social/media/Kx_FUQMlLmHGArkHtrc
The most important attributes of a Cybersecurity worker? Never stop learning. Insatiable curiosity. Interest in a variety of business topics: finance, law, medicine, HR, automated systems, psychology. What would you add?
#business #finance #automation #cybersecurity
Remote tech support for small biz/residential. Licensed and insured. Ten percent of all revenue from CoSo clients will be donated to CounterSocial.