this post was submitted on 23 Jun 2025
1009 points (98.6% liked)

Technology

71800 readers
4219 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
you are viewing a single comment's thread
view the rest of the comments
[–] JasonDJ@lemmy.zip 76 points 23 hours ago (5 children)

Social Engineering is hacking cmv.

[–] OldManBOMBIN@lemmy.world 20 points 23 hours ago

No, because I agree.

[–] nickwitha_k@lemmy.sdf.org 1 points 14 hours ago

It was hacking according to Kevin Mitnick (RIP) so, it's probably safe to say that your view doesn't need to be changed.

[–] Venus_Ziegenfalle@feddit.org 4 points 21 hours ago* (last edited 21 hours ago)

There's usually an element of that with cracking passwords. Even if you just try and pick a good wordlist for a target you're already engaging in a way. The more you know about them the shorter the wordlist. And if you spend enough time getting to know shit about them you can reduce the wordlist to one entry because they told you the password. In a way. It's not necessarily a completely different process is my point.

[–] UnderpantsWeevil@lemmy.world 1 points 21 hours ago (2 children)

You can argue it's a classic ID-10T error in your workflow.

But nobody has discovered a security vulnerability within the system architecture. This is the system operating as designed, abet with the wrong person standing in front of the terminal.

[–] em2@lemmy.ml 10 points 21 hours ago (1 children)

That's called a PICNIC - Problem In Chair Not In Computer.

[–] Krudler@lemmy.world 10 points 20 hours ago
[–] catloaf@lemm.ee 3 points 20 hours ago (1 children)

That's cracking, not hacking. If you're going to be pedantic, be correct.

[–] UnderpantsWeevil@lemmy.world 1 points 18 hours ago

However you want to phrase it, they're very different problems with different solutions.

"Someone picked the lock on my door and got into my house" is meaningfully distinct from "Someone stole my keys".