I was wondering about the percentage of hacks that are social engineering vs. Actual exploits and if that has changed over time.
On Jul 28, 2016, at 4:45 PM, Joseph Oprysko via vcf-midatlantic <vcf-midatlantic@lists.vintagecomputerfederation.org> wrote:
Is the interview going to be recorded/streamed?
On Thursday, July 28, 2016, Neil Cherry via vcf-midatlantic < vcf-midatlantic@lists.vintagecomputerfederation.org> wrote:
On 07/28/2016 04:00 PM, Evan Koblentz via vcf-midatlantic wrote:
I'm writing an article for work about end users being the weakest links in network security.
Lined up an interview with a really famous hacker -- don't want to say who, but it begins with "Kevin" :) at 5pm ET today. That's one hour from now.
Looking for serious suggestions of questions to ask him.
Please reply on-list or privately, and PLEASE refrain from sarcasm or thread-drift.
How about the non-typical, we know most users would sell their soul for a candy bar and that the passwords used are easily guessed or crackable. How about the damage done once the malware is on the network and what it's doing. And perhaps why a topic on why it's important for home users to secure even their little device like printers and router.
I've heard all too often, I have no security on my wifi, what can they get ...
-- Linux Home Automation Neil Cherry ncherry@linuxha.com http://www.linuxha.com/ Main site http://linuxha.blogspot.com/ My HA Blog Author of: Linux Smart Homes For Dummies
-- Normal Person: Hey, it seems that you know a lot. Geek: To be honest, it's due to all the surfing I do. Normal Person: So you go surfing? Normal Person: But I don't think that has anything to do with knowing a lot... Geek: I think that's wrong on a fundamental level. Normal Person: Huh? Huh? What?