tag:blogger.com,1999:blog-49364457178289316452024-03-13T06:04:36.949-04:00Security Memeticskurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.comBlogger6540125tag:blogger.com,1999:blog-4936445717828931645.post-4191302089407685792023-07-17T15:30:00.019-04:002023-07-17T15:30:00.149-04:00Like stealing healthcare data from a law firm<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/Ve4M7qp" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="796" data-original-width="500" height="869" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimk8MBwSvcaseYmHZjO_0k5IL73h__iDEPabC1kgMc3NYgj6yIIT4yf2XVErb1qXQmm3R68ZnOFsam8E_QQt8WgTcZd-4bEfkKpGM0l-hlY7X0J10uzia6dnmaHI-vA-YxpemzBhtVxW92lR7WNac9EhZhq03Lja8s1JpNAqtStNvbYdfLBlIEjpvdXGE/w546-h869/rhyme.jpg" width="546" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/Ve4M7qp">here</a> and <a href="https://imgflip.com/i/7ssmpm">here</a></td></tr></tbody></table><br /><p>Apparently if you suffer a data breach, the data in question may at some point end up in the hands of a law firm. The problem, however, is that law firms are not magically secure, so it's possible for the data to be stolen a second time - which <a href="https://healthitsecurity.com/news/law-firm-suffers-healthcare-data-breach-impacting-40k">one law firm is finding out the hard way</a>. As data breaches continue I have a feeling we may see this happen more frequently.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-18206193494999549532023-07-13T15:30:00.003-04:002023-07-13T15:30:00.148-04:00The patches that never end<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/T6Jce3Z" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="431" data-original-width="578" height="478" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5FgIOQYjEYNZPrh58H4IpYeMbeT3a7GHg7oAdhP7B_5jXhpF3vA9yMFLJx9OsrGrG0IWPG0ur3hZL9MtMMBNvVKDOcW84HWAbBhmusMDJYJnqGpL7WzQFo6DpVnhPp0TAjpkMEjWe0SfGEyv2xbTOxK0qIdXLfyXqKhvCREYzYC6bUgq-wg6OIrrYUe4/w640-h478/ie.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/T6Jce3Z">here</a> and <a href="https://imgflip.com/i/7sedsa">here</a></td></tr></tbody></table><br /><p>Maybe you thought Internet Explorer would be ancient history by now, but unfortunately <a href="https://www.kaspersky.com/blog/microsoft-patch-tuesday-july-2023/48606/">Microsoft is still making security updates for it</a>.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-46934537054584937772023-07-13T10:30:00.001-04:002023-07-13T10:30:00.139-04:00Worst Wifi Password Ever<iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube-nocookie.com/embed/bLE7zsJk4AI" width="560"></iframe><br />
Watch on <a href="https://www.youtube.com/watch?v=bLE7zsJk4AI">YouTube</a><br />
<br />Tricky passwords can be a double-edged sword. You have to make sure they aren't more trouble than they're worth.<div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-73895867983995541152023-07-03T15:30:00.002-04:002023-07-03T15:30:00.143-04:00Someone needs a longer sentence<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/MLdWmZ8" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="430" data-original-width="580" height="474" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0TZT49eOQCSCIDbq4S2LNUiCf0ljt7eoArLEvXAnz74VPLJXVXvZ3cPdD_i4GT2sMOK1X2q-k09vCz3D7q35m4zNLcI7OyYEYThFfEFg5aGmWiQKSoHJ62I7mmERbZQ_cU7zaW8SPtpVOjXAZmdKds3LeORkgkbCsrJkkjR8QhA_ejjcQ1lvEZYhbPGQ/w640-h474/dictionary.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/MLdWmZ8">here</a> and <a href="https://imgflip.com/i/7rbia9">here</a></td></tr></tbody></table><br /><p>I've heard of individuals being threatened and harassed online before, but a <a href="https://www.huffpost.com/entry/jeremy-hanson-merriam-webster-prison_n_64386eb3e4b05765f381556b">dictionary</a>? That takes a special sort of irrationality, which you'd think would make them extra dangerous, but apparently the judge felt otherwise.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-75799442697553053762023-07-03T10:30:00.002-04:002023-07-03T10:30:00.140-04:00Protection isn't always effective<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://www.dumpaday.com/funny-pictures/one-job-failed-29-pics/" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="998" data-original-width="750" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNKoXNdmsIFZ9dmNlcXbOqJng26EXdE-2_GWl8gn52S5W_Z420HSm0b6e2s8rNrgP-0n30Om32FkfIogr8HcAqv20xVoqoMLtppulthXt4YxRe76UC0FeL058KxIASzDarZtLt9DK4ahsyiTV8Vdy3piWWYRPnAARh303lqgb98Auvyrkt_SxsEc3SxG4/w480-h640/1-33.jpg" width="480" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">found on <a href="https://www.dumpaday.com/funny-pictures/one-job-failed-29-pics/">Dump A Day</a></td></tr></tbody></table><br /><p>Something that we must all keep in mind is that there is no protective measure that is perfect. They all fail under the right (wrong) circumstances.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-23144682082074282102023-06-30T15:30:00.008-04:002023-06-30T15:30:00.137-04:00Time to sharpen some wooden stakes<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/dX6Ynrw" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="500" data-original-width="666" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieIfc0DQbQ-OX8Ue6nLpYwIaw6U_29TowJPoSl7bwBVhT8sPAn9msJalrbk6eWVF-FZv1CLpVRDKgytwAv-T_3gBlVDOc1l9ghzJRPtUUmaPcId2SlwG27Rha38V4KWe46LUv-6laji5lN6Oz0gBJArbFP2HS-Yv6YBojs-HjYwy3XsOKHOWPohCnf_oo/w640-h480/inorout.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/dX6Ynrw">here</a> and <a href="https://imgflip.com/i/7r1wbb">here</a> (image <a href="https://izismile.com/2023/03/02/morning_picdump_51_pics.html">source</a>)</td></tr></tbody></table><br /><p>If you look closely at the right hand side it does seem to be bent outwards, which suggests the force came from inside the cemetery. It's also fairly low to the ground, which makes me wonder - is this a pet cemetery?</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-69408829789097289442023-06-30T10:30:00.004-04:002023-06-30T10:30:00.140-04:00"Relevant" ads are creepy AF<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://www.reddit.com/r/memes/comments/ch183z/scary_but_true/" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="892" data-original-width="594" height="817" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMhl_Eb2_piwqluD9EvJgKn313p1XwE6yIDWhkrBXcow_NetCXAEfYN6G1bs6r21MZr1UQ6usJldv56G1YpGX_WtrqwRw93OE81OEyUAN7pTwxfsAYXsYarTAVpo1SG7IctRBxt0-NB3zkYru5SrzLmRfv-A3KFugbXPTzXTtnbr1jPin1BZ9xhEWwjD0/w544-h817/ezgif-5-ba2365b2b9.jpg" width="544" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">found on Reddit</td></tr></tbody></table><br /><p>Presumably they can't actually read your mind. I assume they just correctly recognize that you're similar to people who have expressed the same thoughts you've only ever thought inside your head and are acting on that similarity, but it's still creepy.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-55073968529245228922023-06-29T15:30:00.002-04:002023-06-29T15:30:00.136-04:00A little TOO 'universal'<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/jVLGUYB" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="433" data-original-width="577" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0zDOC_np_HCQAbrE7fzW9la_5xjWAovnrEtjnsD1ije3Tee8i1w718EYf-25x3-Hz885KLJp3YOWhMJFj2lAacWgHaw_BSqAk18uQxEUQTSwRuCP4ExEc2P7AqW3Bw0x156pLHNyHa8ZGjr1sX63N6-apcYNdpVxHedyK5EFNQV6k0AAxq2zOf_Ih8zk/w640-h480/kiaboys.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/jVLGUYB">here</a> and <a href="https://imgflip.com/i/7qxgje">here</a></td></tr></tbody></table><br /><p>A lot of things went wrong with Kias and Hyundais to allow them to be <a href="https://arstechnica.com/cars/2023/06/who-are-the-kia-boyz-how-tiktok-fueled-an-epidemic-of-car-thefts/">stolen as easily as they have been</a>, but one that stands out to me is that there's a receptacle the same size as a USB plug that you can just plug a USB charging cable into and twist like a key to start the engine.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-33509063462229540252023-06-29T10:30:00.001-04:002023-06-29T10:30:00.141-04:00Password policy frustration<iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube-nocookie.com/embed/oI1ZN2H-gzA" width="560"></iframe><br />
Watch on <a href="https://www.youtube.com/watch?v=oI1ZN2H-gzA">YouTube</a><br />
<br />The better designed systems will show you the full set of password policies all at once rather than revealing them individually like this. That way the user should be able to create a new password with the fewest number of failed attempts.<div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-23446119382485206862023-06-28T15:30:00.004-04:002023-06-28T15:30:00.131-04:00What gave it away?<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/Xgxe00z" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="449" data-original-width="700" height="410" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvyunYpJ6DhGggJbJxn8YgAblai7zz4Qg2sovf5u-Rafttj6EawbSwDvx3U9vsej0s3S25AN_nYuHy8VfUpKPMXONb4JCEyKzV3dkGwmCEpacokXQLlbwHwTPmtpMhKxjLLcRottQuuVqwH_a40SXTTnJYRzjMM8X--yo4FMtjLgfsAfz0HktX16wLhDM/w640-h410/bomb.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/Xgxe00z">here</a> and <a href="https://imgflip.com/i/7qt6gg">here</a></td></tr></tbody></table><br /><p>I suppose you don't necessarily have to be a master of operational security to be a flight attendant, but if you're going to <a href="https://www.vice.com/en/article/dy33jz/flight-attendant-charged-for-bomb-threat-to-stop-her-exs-vacation">call in a bomb threat on the plane your ex-boyfriend is on</a> then a bit of opsec would probably help.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-49320686300134820542023-06-28T10:30:00.025-04:002023-06-28T10:30:00.143-04:00Why we need end-to-end encrypted messaging<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://9gag.com/gag/aQE2PWK" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="600" data-original-width="622" height="618" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMBpoGcMJtjb6uR15ZvuN-Is9HHjptqsB88jYmC4FCmOH4pWXKmT2nLFVBtuWZSKupwwlG4BdGNcJ9DXs9TciY1Oor9KL-CVsr1fBTtoiOkGQnsAzAHaOVQRRWKud0V99rTpONsDDNkNZ3wDyxQuAKDtOXiy3eq8urwXKT287_Wbo3oD6NZkomJ54mFdo/w640-h618/ezgif-5-50b1b1d06f.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">found on <a href="https://9gag.com/gag/aQE2PWK">9Gag</a></td></tr></tbody></table><br /><p>I think we can all agree that we'd like to be able to speak privately with the important people in our lives and that some of the things we share would be deeply embarrassing if they were revealed to a wider audience. I'm sure we'd all like to be able to enjoy the freedom to communicate that way, but it's hard to feel that free when we hear about how the authorities are spying on our communications.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-9648336430091319482023-06-27T15:30:00.010-04:002023-06-27T15:30:00.138-04:00Fundamentals First<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/HBpH3ja" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="500" data-original-width="750" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLH5bc__iaIPLNFkcrrrIVMy13B9aKCspgrMfxvhqic4Y1lhMWN9CqSkHpE8s4tpDAoEi5VfKmbZD2E5JQqmuajx4l8-JBQp-2TVrw1c5h9EmRGVNPsKCW21T2MOlqZGJ_jfe4gpS0HRgpN4WWedIT57rZktq8CQYp_FVVSVf6cQo_Ak4PQ4TPiEk96RU/w640-h426/fundamentals.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/HBpH3ja">here</a> and <a href="https://imgflip.com/i/7qp6l5">here</a></td></tr></tbody></table><br /><p>Yes, there is <a href="https://arstechnica.com/information-technology/2023/06/hackers-can-steal-cryptographic-keys-by-video-recording-connected-power-leds-60-feet-away/">a novel side-channel attack that involves video recording of power LEDs</a>, and yes I'm sure it's important to protect your smart card readers against such an attack, but I'm also fairly certain most information security departments are still struggling to deal with phishing and ransomware and aren't anywhere near being in a position where dealing with this novel (and frankly low probability) attack is the best use of their resources.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-53146841697959300792023-06-27T10:30:00.017-04:002023-06-27T10:30:00.138-04:00In OWASP We Trust mug<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://www.teepublic.com/mug/40741763-secure-coding-in-owasp-we-trust-black-background" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="630" data-original-width="630" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh4Vl7lEt9RFSrJBucYH0VMv3Cb18En9gya1dydvVvw9q_GNsQF41uz7TRHxr4kTE7GPurEhaRnMYbQgmI2BA0nhdGcNc4eGyWsptF1FzjOlIVN5NCDEQb4Ntw4O60McEWtOZxB9WXHbTzfe3Bk_zc0Gai9UsgU8le02-hg3p-JBuWcAXiEjMsNhSrw9Q/w640-h640/ezgif-5-2a6ad67d0f.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.teepublic.com/mug/40741763-secure-coding-in-owasp-we-trust-black-background">Product Page</a></td></tr></tbody></table><p>If you're in software development, raise some awareness around the office of the OWASP Top 10 vulnerabilities. They're still being found in software even after all this time, which means not enough effort is being made to avoid them.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-63344585532620695262023-06-26T15:30:00.002-04:002023-06-26T15:30:00.133-04:00Stolen And Purchased<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/yqaXuTO" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="491" data-original-width="508" height="618" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidMCTxKQ6rU6kMDWx3fX5-Md9RRRz2wpSPoXXy-w0MQmd5H_1UiLk3ye09sqAX9Ci0Bv5e5BTkgeCZfx7JImg35tXzwRIz7KdHLIgnrAOP3eG8Z-LJLIQfJKsr1FTuZv-2n0wYbai7l8Z86JWGs9WX9MUCDYyrWrhPJpq1uC84FnZVuSRtbJFebLeNEDo/w640-h618/sap.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/yqaXuTO">here</a> and <a href="https://imgflip.com/i/7qkriv">here</a></td></tr></tbody></table><br /><p>I'm kind of surprised that <a href="https://www.theregister.com/2023/06/21/ssd_sap_datacenter/">SAP's first clue they had a data breach was when they purchased their own hard drive off of Ebay</a>. But if people can just waltz out of their data center with hard drives in their pockets or something then I guess I shouldn't be surprised after all.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-73983318135759103432023-06-26T10:30:00.002-04:002023-06-26T10:30:00.144-04:00That mental image, though<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://www.reddit.com/r/BrandNewSentence/comments/yk5duh/sand_papering_a_what/" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1440" data-original-width="1080" height="769" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQioa62JNB7-4y2U5Anqdx8jtyjRmFKryJWtwcRyyvMftnQgqgep0FJ2NOEadJKYdqLgxaxvzfvUQ9lwn1C85YQDCSOtAmhBUL8wkAb8ed7ei_DqSSs3fpFncO1yxuC4FQtfKbF9NaIED9VCaCz0uEIpMmx2nOQh5qGWPQKaJ0cNf14zEnWanAUTWe8bQ/w577-h769/ezgif-3-dbb2a571aa.jpg" width="577" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">found on <a href="https://www.reddit.com/r/BrandNewSentence/comments/yk5duh/sand_papering_a_what/">Reddit</a></td></tr></tbody></table><br /><p>Deterrence is ultimately a mental exercise, it operates on the mind of the people you hope to deter. As such, it's probably a good thing to try things a little off the beaten path because "Danger!" and "Keep Out!" are things people have seen a million times and so are desensitized. This one paints a very evocative mental image, though maybe it sparks a bit too much curiosity.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-38100242033633802512023-06-23T15:30:00.003-04:002023-06-23T15:30:00.137-04:00"Smart" Armour<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/IaD8Rhe" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="590" data-original-width="500" height="721" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2bS4VA5ih5KA-eqS0kYXKaTZI9fjAsSB7ffHAipOSplbTUYR_E0Dlpi0IJccpira_y-mGogVoRxcz_NDEz9eSYlwDVmi88j9RV48_5IgVQuNdEZJIx_m4IP-jsxR7UtclxpGc0XZjh2KiND02TTRfI-cG6oaTlVsgp3Cehg_QVEfnm0A5-Mc25J44qt4/w611-h721/smartarmour.jpg" width="611" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/IaD8Rhe">here</a> and <a href="https://imgflip.com/i/7qarx5">here</a> (image <a href="https://www.theverge.com/2015/1/12/7530919/iphone-smuggling-china-border">source</a>)</td></tr></tbody></table><br /><p>Of course <a href="https://www.wtnh.com/news/connecticut/new-haven/cell-phone-struck-by-bullet-saves-new-haven-shooting-victim-from-further-harm-police/">the person whose phone saved them from a bullet</a> was actually just really, really lucky. Phones aren't bulletproof, and body armour made out of them would cost far more than they'd be worth. Of course if you did do it then you'd probably want the phones to partially overlap each other, like dragon skin body armour, rather than what the guy above was doing.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-8373313188019533362023-06-23T10:30:00.001-04:002023-06-23T10:30:00.144-04:00Sometimes the obvious countermeasures are the easiest ones to forget<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://www.reddit.com/r/technicallythetruth/comments/141tuf6/no_catchy_title_ideas/" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="821" data-original-width="1080" height="486" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBNgjGf3MGjDlzBJb3AFgV5NOeg2KzsMfoDWCHTvSfPJemJF5TPpDMQQIHwP6h0fkV0-mYMKgURFgzCtoIc4-DLXjn8kMn8aAszJ_ui0qgEgAr3XS9S9rYQufRWyd58FbhON9gcmOgsQF23l-t4bzUQQEU63U3UVy60ic9VXO54WX7kZ4Nqe47U101/w640-h486/ezgif-5-7e94ea43a4.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">found on <a href="https://www.reddit.com/r/technicallythetruth/comments/141tuf6/no_catchy_title_ideas/">Reddit</a></td></tr></tbody></table><p>Stay out of the water, stay out of the bad part of town, stay out of untrustworthy websites, etc. If you always remember those sorts of obvious things, good for you, but plenty of people need reminders, and some never knew in the first place. So don't just remember for your own sake, remember to share those steps with others as well.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-83464460204268516142023-06-22T15:30:00.002-04:002023-06-22T15:30:00.153-04:00One way to make cookies bite the biscuit<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/r7xZgJW" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="500" data-original-width="656" height="488" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixROlJLcvrnvbO8lsFAPej1eWFauCROYXW4TXe1wo-4AWzDzaeUsGTZQUKcdW-L-ErtdF4GNkWvitf4DMm75mwWaU5WLMoQDDmsq8Uz5MpqMrHEou4CQW8wGJTjMunjQbrLEFiwnJAglGx_sIvMR3MlvcFCNouCKEdcz_NuYGXBdC8gpUPCFNn-GCkq4A/w640-h488/cookies.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/r7xZgJW">here</a> and <a href="https://imgflip.com/i/7q641x">here</a></td></tr></tbody></table><br /><p>Actually blocking cookies seems to create problems with a surprising number of sites, so using incognito mode or private browsing mode in other browsers to limit the lifetime of the cookies to as long as the browser window is open is the next best thing. Neither stop other forms of tracking, though.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-29143479543552276702023-06-22T10:30:00.001-04:002023-06-22T10:30:00.143-04:00The bear essentials of deterrence<iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube-nocookie.com/embed/T_bSPbUFZP8" width="560"></iframe><br />
Watch on <a href="https://www.youtube.com/watch?v=T_bSPbUFZP8">YouTube</a><br />
<br />If you can scare away your adversary then your job is done.<div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-42659783895353442382023-06-21T15:30:00.004-04:002023-06-21T15:30:00.147-04:00Got it, got it, need it, got it<p><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/FCUmv7e" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="635" data-original-width="500" height="752" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZOWcN1uSbdlzuptgYubdugomi78AaA2W0ZC8muxl8ioXzC7zO530l18mev5Zp6bNcZRQbIvH0fiHelMXypaB7d3itRWzExyicDnxnsFMvpPeS6077f6TI2Y3MU_xlA5EHEPByBxSs5CV8xXc5Q_k3D2uPmVYdHxpzDYpDLp_rjSzAjTP7v4WuP7vp2hs/w592-h752/gettingbad.jpg" width="592" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/FCUmv7e">here</a> and <a href="https://imgflip.com/i/7q1bqv">here</a> (source <a href="https://www.bbc.com/news/technology-65965453">article</a>)</td></tr></tbody></table><br />I knew crooks used the MOVEit vulnerability to breach a lot of organizations, but when the number is so high that you start assuming all breaches are the same group, then things start to get a little ridiculous.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-61491562385642606412023-06-21T10:30:00.002-04:002023-06-21T10:30:00.139-04:00Magical "Security"<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://harrypotter.fandom.com/f/p/4400000000003739311" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="755" data-original-width="755" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDQUb2wWXhxnQOMxXjjiRV8GOMtkioxkwbrSqHQQW5P2mNedlpwZzZs_TP_r6mzNQt5aumbxDSbrQKrieT-CbnlMLSWrWeUqycXc64fOhJqH_ppUsbg7GLXz2SeEqMP8bKqrMYucqImkd3wv4ixdeSu-DHPS-9ypR_isBL4IEwcy0CVP3OdIPm2WXJ/w640-h640/ezgif-5-d128fc84d9.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">found on <a href="https://harrypotter.fandom.com/f/p/4400000000003739311">Harry Potter Fandom</a></td></tr></tbody></table><br /><p>When your security practices are informed by magical thinking, even children will find a way around your protective measures.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-56835115091818202132023-06-20T15:30:00.002-04:002023-06-20T15:30:00.136-04:00Moving your data into their hands<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/DEeKQXj" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="450" data-original-width="600" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxuy7j9FArS433I-qtYZTKsxkm73NqXPzBL54ywII5JzEfYil5olS-bf5Mlan1i4hNTg-CNQg7eO5JthhDdWpMfuCKPzGLPhRfG9g3eUKBFTWHUg0k1rMCwIjG4dgK3EXO-k1QzkVmK7A0S4vnheEWKgPNf8BSF4qQ146G7-wOj8uTuv-mb-r--mD389w/w640-h480/moveit.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/DEeKQXj">here</a> and <a href="https://imgflip.com/i/7pwzx4">here</a> (image <a href="https://finance.yahoo.com/news/funniest-hacker-stock-photos-2-073200165.html">source</a>)</td></tr></tbody></table><br /><p>The MOVEit vulnerability has been exploited far and wide, but <a href="https://arstechnica.com/information-technology/2023/06/millions-of-americans-personal-dmv-data-exposed-in-massive-moveit-hack/">this latest one involving the DMV</a> seems particularly far reaching.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-13887856319745588092023-06-20T10:30:00.002-04:002023-06-20T10:30:00.157-04:00Mom & Hacker tote bag<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://www.redbubble.com/i/tote-bag/Mom-and-Hacker-by-hkrmerch/47866181.A9G4R" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1000" data-original-width="1000" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGLKNvYcMHaRGE-tPc7gNOazkadF-8MVsbyjn7nnDPoILkXX2qXCU43Ra6kdyuRlh8vZ5UuPKRD54sVfOSzveFRHRtI7qWe2V-KqzamOJH6yR5AUgFiBKcExZwH7xDom1aHDUknPOtbQzweEaAsIisuMJfpIoFVptxsvleAWKY0A5_rruccHdOiPDU/w640-h640/tb,1000x1000,medium-pad,1000x1000,f8f8f8.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;"><a href="https://www.redbubble.com/i/tote-bag/Mom-and-Hacker-by-hkrmerch/47866181.A9G4R">Product Page</a></td></tr></tbody></table><br /><p>Don't sell moms short when it comes to technology in general and hacking in particular. My mom may not have been a malware reverser, but she was certainly able to exploit technological loopholes.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-15847162063987674882023-06-19T15:30:00.006-04:002023-06-19T15:30:00.138-04:00Jeepers creepers where'd you get those peepers<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://imgur.com/gallery/du4puUt" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="500" data-original-width="645" height="496" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx3cgoI_dBTYFMapdjMR3cqantgztW1o-IeLURRzsSN8ngBZev9TWJiVWkxEDyxsljAMolx7LG3tl8eL17K2oyeWGC_G3tru1XY4ivSy9N95ZPFye34CTXAUoUb5rbhwuAjlIvS5XOsQ79rElW2wsRf1us60I20q5-FnMP18Xw6IQYHwKpV8BHmlhi/w640-h496/peepers.jpg" width="640" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">from <a href="https://imgur.com/gallery/du4puUt">here</a> and <a href="https://imgflip.com/i/7pt49t">here</a> (image <a href="https://www.reddit.com/r/DeepRockGalactic/comments/vc5qsi/when_the_scout_zips_just_a_little_too_close_to/">source</a>)</td></tr></tbody></table><br /><p>If it weren't for the normalization of surveillance we wouldn't get amazingly disturbing images like this one.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0tag:blogger.com,1999:blog-4936445717828931645.post-25946863679670904542023-06-19T10:30:00.002-04:002023-06-19T10:30:00.137-04:00Cursed Camouflage<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://www.dumpaday.com/funny-pictures/after-dark-funny-meme-dump-37-pics-151/" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="937" data-original-width="750" height="716" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwNXtu43ER_TPuafdl9AYq1iMssaEpdbX2ra6TtGXaGrYDnJvW0crRg2fHCb9sHxP-0ZXtIRsFtSkPENFLhDk9MRdey3FD6mKktHQvpj2W4B03CLlkxoaRE6BJ3criaYjQGaJUBTMRxbX04A7bK5Yc9gPe7sQU4wXWGdjX6iIeuIQCxrwbPEvK6cKe/w573-h716/you-find-it-at-a-thrift-shop.jpg" width="573" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">found on <a href="https://www.dumpaday.com/funny-pictures/after-dark-funny-meme-dump-37-pics-151/">Dump A Day</a></td></tr></tbody></table><br /><p>Yes, you can definitely disguise one inappropriate thing as another inappropriate thing, but when people eventually realize what they were staring at they're going to hate themselves.</p><div class="blogger-post-footer">http://feeds.feedburner.com/SecurityMemetics</div>kurt wismerhttp://www.blogger.com/profile/03810635947269551517noreply@blogger.com0