June 9: No, there’s no evidence a hack called RockYou2021 exposed 8.4 billion passwords

(Photo credit: cybernews.com)
An ad for purported Yahoo passwords on a dark web marketplace — an example of how leaks from a breach can circulate and recirculate. (Photo credit: Gigazine)
Password crackers are nearly as old as the internet, and they’re not as sophisticated as many seem to think. Changes in routine security have left crackers like Brutus, pictured above, obsolete. (Photo credit: Darknet.org.uk)
  • Ethical reporting standards go out the window in tech journalism, even at “reputable” publishers or broadcasters
  • A person or entity claiming “cybersecurity expertise” may be trying to sell you something you don’t need
  • Proper password hygiene and basic cybersecurity best practices are a lot more effective than running frantically to a password checker whenever a “data breach” is revealed
  • CyberNews is definitely staffed entirely by Lithuanian basketball players




Oh geez, Josh Frank decided to go to Flatiron? He must be insane…

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How you could get hacked at a coffee shop

Coinbase’s Super Bowl commercial is a bouncing QR code

Introducing BlackHole Protocol x Bounce Certified IDO Whitelisting

Juncker’s State of the Union: A sober call for European sovereignty

What is Data Breach? How to Prevent Data Breach | Testbytes

Finding Your Niche In Cybersecurity

How to add #$SANTA. to your trust wallet;

Security Professionals — What Do We Do All Day?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Josh Frank

Josh Frank

Oh geez, Josh Frank decided to go to Flatiron? He must be insane…

More from Medium

NIST has released a guide to protecting against ransomware

2022’s Top Cyber Security Trends with a Quantum Twist

January 2022 Patch Tuesday BLUF

Get the Most of Your Modem with AT Commands