Thursday, September 21, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Move to the Cloud with Confidence: 6 Key Risks & Mitigation Techniques — Part 2
  • What is an Authenticated Security Scan, And Why Is It Important?
  • Orchestration Kitchen Workshop on Migrating CIAM from Keycloak to Amazon Cognito
  • Everything You Need to Know About Rezilion’s SOC 2 Compliance 
  • The art of security chaos engineering
Humor Security Bloggers Network 

Home » Cybersecurity » Humor » XKCD, How Hacking Works

SBN

XKCD, How Hacking Works

by Marc Handelman on July 18, 2019

via  the comic delivery system monikered  Randall Munroe  at  XKCD !

via the comic delivery system monikered Randall Munroe at XKCD!

AWS Builder Community Hub

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2019/7/18/xkcd-how-hacking-works

July 18, 2019July 18, 2019 Marc Handelman Sarcasm, satire, Security Humor, XKCD
  • ← How Cyber Security Exercises Can Keep You in Shape
  • Microsoft Defender Advanced Threat Protection Queries →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Thu 21

Holistic AppSec and Software Supply Chain Security

September 21 @ 11:00 am - 12:30 pm
Thu 21

What AI Doesn’t Know About Kubernetes in Production

September 21 @ 12:00 pm - 1:00 pm
Fri 22

Cloud Security Turbocharged: A Wild Ride of Innovation, Threats and Staying Ahead

September 22 @ 11:00 am - 12:00 pm
Mon 25

Cloud Security

September 25 @ 1:00 pm - 2:00 pm
Thu 28

A Guide to Smart Dependency Management

September 28 @ 12:00 pm - 1:00 pm
Oct 03

Way Too Vulnerable: Uncovering the State of the Identity Attack Surface

October 3 @ 11:00 am - 12:00 pm
Oct 11

ASPM: Leveling the AppSec Playing Field

October 11 @ 1:00 pm - 2:00 pm
Oct 16

Shadow Access: Where IAM Meets Cloud Security

October 16 @ 3:00 pm - 4:00 pm
Oct 17

Securing Cloud-Native Applications Across the Software Development Life Cycle

October 17 @ 11:00 am - 12:00 pm
Oct 18

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

October 18 @ 12:00 pm - 1:30 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

More Humor

Humor Security Bloggers Network 

Randall Munroe’s XKCD ‘Haunted House’

September 20, 2023 Marc Handelman | Yesterday 0
Humor Security Bloggers Network 

Randall Munroe’s XKCD ‘Iceberg Efficiency’

September 19, 2023 Marc Handelman | 1 day ago 0
Patch EVERYTHING: Widely Used ‘WebP’ Code has Critical Bug
Analytics & Intelligence API Security Application Security AppSec Cloud Security Cloud Security Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics DevOps DevSecOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response Insider Threats Malware Mobile Security Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Securing the Cloud Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Security Challenges and Opportunities of Remote Work Security Operations Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

Patch EVERYTHING: Widely Used ‘WebP’ Code has Critical Bug

September 13, 2023 Richi Jennings | Sep 13 0
Humor Security Bloggers Network 

Randall Munroe’s XKCD ‘Brassica’

September 13, 2023 Marc Handelman | Sep 13 0

Most Read on the Boulevard

Group Allegedly Behind MGM, Caesars Attacks is Fairly New to Ransomware
LockBit Affiliates Use RMM Software in Ransomware Attacks
CrowdStrike Extends Scope of Managed Cybersecurity Services
Leveraging Wargaming Principles for Cyberdefense Exercises
Pillars of Cloud Security
How to secure payments from checkout to chargeback: Pairing Sift Payment Protection and Dispute Management
Understanding the Cyber Kill Chain: A Comprehensive Guide to Cybersecurity
2023 OWASP Top-10 Series: API8:2023 Security Misconfiguration
Cyber Week 2023 & The Israel National Cyber Directorate Presents – FraudCON In-Person
Automated Vulnerability Detection: Mitigate Fraud and Strengthen Your Cybersecurity Defense

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

Google: Chromebooks Will Get 10 Years of Software, Security Updates
Application Security Cybersecurity Data Security Endpoint Featured Industry Spotlight Malware Mobile Security Network Security News Security Boulevard (Original) Spotlight 

Google: Chromebooks Will Get 10 Years of Software, Security Updates

September 19, 2023 Jeffrey Burt | 1 day ago 0
Group Allegedly Behind MGM, Caesars Attacks is Fairly New to Ransomware
Cloud Security Cybersecurity Data Security Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threats & Breaches 

Group Allegedly Behind MGM, Caesars Attacks is Fairly New to Ransomware

September 18, 2023 Jeffrey Burt | 2 days ago 0
DoD Turns to Stronger Alliances to Combat Cyberthreats
Cybersecurity Data Privacy Featured Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Spotlight 

DoD Turns to Stronger Alliances to Combat Cyberthreats

September 14, 2023 Jeffrey Burt | Sep 14 0

Top Stories

Barracuda Networks Issues Email Inbox Rules Manipulation Warning
Analytics & Intelligence Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Malware Network Security News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Barracuda Networks Issues Email Inbox Rules Manipulation Warning

September 20, 2023 Michael Vizard | Yesterday 0
Coalition Report Reveals Ransomware Resurgence
Analytics & Intelligence Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Malware News Security Boulevard (Original) Spotlight Threat Intelligence 

Coalition Report Reveals Ransomware Resurgence

September 20, 2023 Michael Vizard | Yesterday 0
Dig Security Adds Support for SaaS Apps to DSPM Platform
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threat Intelligence 

Dig Security Adds Support for SaaS Apps to DSPM Platform

September 20, 2023 Michael Vizard | Yesterday 0

Security Humor

Randall Munroe’s XKCD ‘Haunted House’

Randall Munroe’s XKCD ‘Haunted House’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.