Sunday, December 8, 2019
  • Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Don’t’
  • DEF CON 27, The Social Engineering Village, R. Paul Wilson
  • When Will Blockchain Technology Be a Game-Changer?
  • Single Sign-On (SSO) vs Active Directory (AD)
  • Ransomware at Colorado IT Provider Affects 100+ Dental Offices

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Humor Security Bloggers Network 

Home » Cybersecurity » Humor » The Joy of Tech®’s ‘Sextortion’

The Joy of Tech®’s ‘Sextortion’

by Marc Handelman on August 30, 2018

   via    the Comic Noggins of     Nitrozac    and    Snaggy    at    The Joy of Tech®!

via the Comic Noggins of  Nitrozac and Snaggy at The Joy of Tech®!

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.geekculture.com/joyoftech/joyarchives/2541.html

August 30, 2018August 30, 2018 Marc Handelman Joy of Tech®, Sarcasm, satire, Security Humor
  • ← Managed Detection and Response: Hype or Hope?
  • Why It’s Time to Take Identity Security Seriously →
Featured Blog

Enzoic

Automate Password Policy & NIST Password Guidelines

Enzoic

Old vs. New Methods for Employee Password Hardening

Enzoic

Shop Safely This Cyber Monday

Enzoic

Disney and the Password Reuse Problem

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

More Humor

Humor Security Bloggers Network 

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Don’t’

December 8, 2019 Marc Handelman | 4 hours ago 0
Humor Security Bloggers Network 

XKCD, Is It Christmas?

December 6, 2019 Marc Handelman | 2 days ago 0
Humor Security Bloggers Network 

XKCD, Group Chat Rules

December 5, 2019 Marc Handelman | 3 days ago 0
Humor Security Bloggers Network 

The Joy of Tech®, ‘The Online Shopping Experience!

December 4, 2019 Marc Handelman | 4 days ago 0

Most Read on the Boulevard

Are Passwords Now Passé?
Learning From Health Care’s IoT Security Strategy
Why You Need PAM and VPAM in 2020
Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Can Antivirus Companies Use ‘Good Samaritan’ Defense to Block Rival Software?
Uncovering vulnerabilities in Cryptographic libraries: Mayhem, Matrixssl, and WolfSSL
Data Protection in the Digital Transformation Era
Dangerous Android Vulnerability that Lets Attackers Steal Sensitive Data Found in Wild
SQL Injection loses #1 spot as most dangerous attack technique
Verizon’s 2019 Payment Security Report – Not Just for PCI

Upcoming Webinars

Mon 09

Cloud Security – Keeping Serverless Data Safe

December 9 @ 11:00 am - 12:00 pm
Tue 10

Securing Mobile Apps, From the Inside Out

December 10 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Open Source Security: Weighing the Pros and Cons

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Learning From Health Care’s IoT Security Strategy
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Learning From Health Care’s IoT Security Strategy

December 6, 2019 Mike Nelson | 2 days ago 0
Why You Need PAM and VPAM in 2020
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Why You Need PAM and VPAM in 2020

December 5, 2019 Tony Howlett | 3 days ago 0
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Are Passwords Now Passé?

December 4, 2019 Ori Eisen | 4 days ago 0

Top Stories

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Cybersecurity Endpoint Featured Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

December 6, 2019 Richi Jennings | 2 days ago 0
StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Cybersecurity Data Security Featured Malware Mobile Security News Security Awareness Security Boulevard (Original) Spotlight 

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

December 3, 2019 Richi Jennings | Dec 03 0
TrueDialog Leaks 600GB of Personal Data, Affecting Millions
Cloud Security Cybersecurity Data Security Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight 

TrueDialog Leaks 600GB of Personal Data, Affecting Millions

December 2, 2019 Richi Jennings | Dec 02 0

Security Humor

via    the respected information security capabilities of   Robert M. Lee     & the superlative illustration talents of   Jeff Haas   at   Little Bobby Comics  .

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Don’t’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2019 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.