this post was submitted on 11 Jun 2024
375 points (97.5% liked)

World News

39376 readers
2001 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News [email protected]

Politics [email protected]

World Politics [email protected]


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 206 points 6 months ago (4 children)

He didn't hack anything. He used a password that wasn't changed.

[–] [email protected] 86 points 6 months ago (2 children)

Which was also used repeatedly over the course of 3-4 months to gain access via a non-corporate laptop without the IT doing anything about it.

[–] [email protected] 56 points 6 months ago

Yeah that seems pretty negligent on their part.

[–] [email protected] 11 points 6 months ago

I've been in IT for a few years and I've changed companies a few times. I just checked my login creds for various systems of 3 previous employers and like half of them still work. Unfortunately it's a lot more common than any IT department would like to admit

[–] [email protected] 59 points 6 months ago (2 children)

It’s only hacking if it’s in a CVE.

Anything else is just sparkling unauthorized access.

[–] [email protected] 10 points 6 months ago (1 children)

That's just not true.

  1. Zero days
  2. Social Engineering
  3. Things that just don't receive a CVE, because there are many more vulnerabilities than there are CVEs
[–] [email protected] 10 points 6 months ago (2 children)

Social engineering isn't hacking. It's social engineering

[–] [email protected] 3 points 6 months ago

Hacking humans, not technology

[–] [email protected] 1 points 6 months ago

Social engineering = human hacking

[–] [email protected] 3 points 6 months ago (1 children)
[–] [email protected] 4 points 6 months ago

I hack my supermarket by stealing mangoes.

[–] [email protected] 12 points 6 months ago* (last edited 6 months ago) (2 children)

Technically he was not authorized to use the computer system due to his termination which the law looks at and calls hacking.

[–] [email protected] 24 points 6 months ago (1 children)

No, the law specifically called this "unauthorized access to computer material". It's right there in the article.

[–] [email protected] 1 points 6 months ago

I'll give you half a point because technically you are right.

[–] [email protected] 10 points 6 months ago

He also didn't delete servers