Recently, computers around the world went down during an update. It was not a security event, but was instead an accident by this well known security vendor.
Who is Crowdstrike?
This earliest computer authentication method, is being phased out, by companies like, Google, Microsoft, Oracle, and Conner Strong & Buckelew.
What is a password?
The Phirst modern hackers hacked these phun telecommunications devices, giving the late Bell company odgena.
What are Phones?
Alan Turing was an English mathematician, computer scientist, and philosopher. Considered to be the father of theoretical computer science, Turing played a crucial role in cracking the code of Enigma, an encryption machine used in this war.
What is World War II?
Website tool to track activity by Sesame Street baked treat icon.
What is Browser (or web, website) Cookie Monster?
Microsoft's authentication token that protects against eavesdropping and replay attacks, is named after this mythical dog with three heads.
What is Cerebos? (Kerberos)
Daily Double!
What is MOVEit?
Its the use of your physical form or characteristic for authentication.
What is biometric authentication?
An early hacker who figured out how to trick pay phones using a special frequency, used a toy prize this popular cereal, whose crispy namesake keeps things ship shape!
What is Captain Crunch?
A "Honeypot" is one of many deception technologies used by security professionals to deceive whom?
Who are hackers?
80's doll craze apply updates to Microsoft's laptop operating system.
What is Cabbage patch Windows?
A Daemon is a backend process in Linux or Unix, the name chosen from the Greek word for this Halloween character.
What is a spirit or ghost or demon?
This AI tool raised concerns among cybersecurity experts about its use by hackers when crafting more convincing phishing and social engineering attacks.
What is ChatGPT?
Security experts warned about this phenomenon, where users feel tired and overwhelmed by logging in. Sounding a bit like camouflage, it's "authentication" this.
What is authentication fatigue?
A voice phishing technique, with a not so clever name.
What is vishing?
This technology promises to revolutionize cybersecurity by enabling decentralized, tamper-proof ledgers for secure data sharing.
What is blockchain?
Equivalent to one Byte of a candy made from an Irish Bee's product.
What is Eight Bit O'Honey?
Named after the Greek messenger of the gods for its swift and stealthy action, this ransomware shares a name with a French luxury design house.
Who is Hermes?
It's the well known password manager company and tool that faced scrutiny over its encryption policies, many vulnerabilities, and how it handled users’ sensitive vault data. For Halloween, it could also be the spooky name of final credentials you use to log in before you die!
Who or What is LastPass?
This more than improbable kind of travel may set off security alerts. Such as when your account logs in, from Camden, and five minutes later from New Zealand.
What is impossible travel?
This notorious spyware can infect a smartphone via a simple text message or missed call, or it's the mythical flying horse.
What is Pegasus?
Daily Double!
What is a private key?
A large releases of information to Wikileaks using a vehicle for transporting and off-loading soil and gravel.
What is data dump truck?
From the Greek word for hidden or secret, it's used in disguising informaiton, which involves transforming it into an unreadable format, now a nickname for digital currency.
What is Crypto?
Users in 2003 questioned the privacy of messages and location data after high-profile breaches were revealed in this company, whose new name "marks the spot."
Who is "X" or "Twitter?"
Recently, researchers explored this futuristic form of biometric authentication, analyzing these unique chemical signatures emitted by individuals.
What are pheromones?
Technically, the very first cyber attack occurred in this country in 1834, where two thieves stole financial market information by hacking the Telegraph System, possibly to corner the markets of Bordeaux or Fromage.
What is "France?"
Botnet attacks increasingly target these types of devices, hijacking the growing number of internet connected everyday appliances and gadgets, in the office or around your home, in order to cause large-scale network disruptions.
What are Internet of Things (IoT) devices?
This book has wonderful smells on different pages if activated with your fingernail as you collect the data travelling across the wires that connect your computers that resembles a congestion of tiny autos on the highway.
What is Scratch n' Sniff the network traffic?
While this word comes from the Latinized name of the Persian mathematician Al-Khwarizmi, the word "arithmos" (ἄριθμος), meaning number in Greek, relates to the role of these in computations and cybersecurity.
What is algorithm?