This content creation platform involuntarily went open-source when a recent breach leaked source code going back years
What is Twitch?
Robert'); DROP TABLE Students;--
What is SQL injection?
This anticipated glitch kept programmers up late on the night of December 31st, 1999
What is the Y2K bug?
This substitution cipher works by rotating letters a fixed number of places down the alphabet
What is ROT13?
Ports 80 and 443 are commonly used for sending data using this protocol
What is Hypertext Transfer Protocol (HTTP/HTTPS)?
This major supply chain attack was partly caused by an intern using the password [companyname]123
What is the SolarWinds breach?
<script>alert("pwned");</script>
What is cross-site scripting (XSS)?
This model of car used malicious software and physical devices to cheat federal emissions tests
What is the Volkswagen Beetle?
This widely used public-key cryptosystem relies on the difficulty of factoring prime numbers for its security
What is RSA?
Port 22 is the default port for this remote command line access protocol
What is Secure Shell (SSH)?
A data breach at this MySpace widget company offered password crackers an excellent dictionary by exposing millions of plaintext passwords
What is RockYou?
This virus spreads affection and malicious code by emailing itself to everyone in its victims' Outlook address books
What is the ILOVEYOU worm?
This polyalphabetic substitution cipher created in the late Middle Ages uses a keyword to encrypt messages
What is the Vigenère cipher?
Port 25 is the default port for this email transmission protocol
What is Simple Mail Transfer Protocol (SMTP)?
Outdated software led to this major data breach that leaked birth dates and social security numbers of over 100 million Americans
What is the Equifax breach?
admin*)((|userpassword=*)
What is LDAP injection?
These bots, also known as web crawlers, are used by search engines like Google to index web pages
What are spiders?
This cryptocurrency, known for its focus on privacy, is speculated to be used in as many as 44% of ransomware attacks
What is monero?
Ports 137-139 and port 445 are commonly used for this Windows file sharing protocol
What is Server Message Block (SMB)?
This zero-day vulnerability in a major operating system was kept secret by the NSA for over five years
What is Eternal Blue?
() { :;}; echo pwned
This early-internet era virus, which entered computers through a vulnerability in the Unix sendmail program, was written by the son of the NSA's chief security scientist
What is the Morris worm?
This cryptographically strong key derivation function is the industry standard for hashing passwords as recommended by RFC 8018
What is the Password-Based Key Derivation Function 2 (PBKDF2)?
This port number is popular among malware authors who want to show off their elite hacking skills
What is port 1337?