Born in Chicago, IL, this CEO of OpenAI probably wishes his technology could somehow make the Bears win more often.
Who is Sam Altman?
This legendary phone phreak and social engineer once hacked Pacific Bell, went on the run, and later became a famous security consultant, because redemption arcs sell.
Who is Kevin Mitnick?
This healthcare-focused U.S. regulation ensures your doctor doesn't accidentally (or purposefully) tweet your MRI results.
What is HIPAA?
This Linux system lets you schedule a program to run at a specific time, the hacker’s favorite way to automate bad decisions.
What is Cron?
This security method helps protect your accounts even if your password is stolen.
What is 2FA or MFA?
When an attacker manipulates Ai's input to make it ignore prior instructions or perform unintended actions.
What is a prompt injection attack?
In 2024, a faulty software update from this cybersecurity company caused a massive, worldwide IT outage that affected millions of Windows computers.
What is Crowdstrike?
This U.S. federal agency within the Department of Commerce that develops and promotes measurement standards, technology, and best practices to enhance innovation, improve industrial competitiveness, and strengthen national security.
What is National Institute of Standards and Technology (NIST)?
This Linux command searches for patterns in text using regex — it’s both powerful and confusing enough to make you question your career choices.
What is grep?
Think of it as keyboard spam with purpose: throw enough guesses at an account until the right one cries uncle. Works great if your password policies are still partying like it’s 2005.
What is brute force?
Like fixtures that prevent people from falling from great heights, this term refers to the security feature in GenAI models that block inappropriate requests.
What are guardrails?
This 2017 breach of a credit bureau exposed the personal data of 147 million Americans, ironically making the company's name sound like a bad joke
What is Equifax?
This EU regulation made "right to be forgotten" a household phrase and gave every website that annoying pop-up about cookies
What is GDPR?
This Linux command changes file permissions, but if you misuse it you've basically left your system's front door wide open
What is chmod?
This technique maps open ports and identifies running services on a host, the reconnaissance staple most defenders and attackers both learn first.
What is Port Scanning?
Jeopardy within Jeopardy! This IBM system wowed Alex Trebek and a global audience when it defeated Ken Jennings and Brad Rutter in 2011.
What is Watson?
In 2015, this "connected car" hack let researchers remotely take control of a vehicle on the highway, proving sometimes your vehicle just needs a firmware update, not a tune up.
What is Jeep Cherokee?
This California law gave residents the right to know what personal info companies collect and sell. Basically, GDPR's West Coast Cousin
California Consumer Privacy Act
This command shows all open network connections and listening ports, perfect for finding that sketchy process whispering on TCP 4444
What is netstat?
This technique involves code format modification to make it harder to understand.
What is obfuscation?
You've certainly used the tool, but the letters actually stand for something! GPT, the model family that has helped many a student finish a last-minute essay, is an abbreviation for these three words.
What is Generative Pretrained Transformer?
In 2020, this supply chain attack infiltrated multiple U.S. federal agencies via a compromised update.
What is SolarWinds?
Signed in 2018, this U.S. regulation set the rules for collecting data from users under 13, because "ask your parents" finally became federal policy.
What is Children's Online Privacy Protection Act("COPPA")?
This command reveals every stop your packets make on their way to a destination — perfect for figuring out why your traffic took a scenic route through Singapore.
What is traceroute?
This kind of malware modification rewrites parts of its own code.
What is polymorphism?