228
you are viewing a single comment's thread
view the rest of the comments
[-] bassomitron@lemmy.world 16 points 6 months ago

I've worked in IT for 15 years and it's the first time I've heard SMS phishing condensed to smishing. But I specialize in servers and server security, so I'm not too surprised it's a thing.

[-] sugar_in_your_tea@sh.itjust.works 3 points 6 months ago

We're forced to take a cybersecurity online course every year, and I'm constantly confused at what the terms are supposed to mean. Like why is spear phishing a thing? Why do we need specialized terms for every conceivable variation of a concept?

Let's just stick with basic terms:

  • malware - malicious software
  • social engineering - covers calls, texts, emails, etc designed to get access to something they shouldn't
  • cracking - breaking cryptography
  • security hacking - breaking secure systems by exploiting bugs, such as zero-days or unpatched systems, usually to get privilege escalation

I may be missing a couple, but I think most cybersecurity concepts can fit in one of those categories.

[-] bassomitron@lemmy.world 2 points 6 months ago

Well, I'm not a cybersec specialist, but my job requires us to comply with NIST cyber security frameworks, including going through external audits every year. In my opinion, your basic generalities are fine for those not working in that field specifically.

However, for cyber security analysts and other specialists, I think specific subcategories are necessary. The reason being, IT is an absolutely massive field that contains a ton of specialties. As such, that means there are roughly an equal variety of malicious actors in the same field.

There's no such thing really as a general "hacker" anymore. Especially when you take into consideration the rapid expansion of state sponsored cyber attacks/warfare. You'll have specialists for various types of:

  • phishing (e.g. targeting general pop/employees, or those going for specific people)
  • cryptography (e.g. those who try to compromise an org's PKI, or people finding vulns to exploit expired certs like what happened with Azure last year)
  • vuln hunters/exploiters (e.g. people that monitor known vulnerabilities and probe orgs' defenses to see if those vulns are present/unpatched/unmitigated, or even people who try to discover new ones)
  • malware engineers (e.g. fairly self explanatory, but malware is a very broad term and can come in numerous shapes and sizes, like even using infected images on a website to conduct RCE on mobile devices like what happened a year or two ago)

Sorry, tangent is getting a bit long-winded now. Anyway, tldr; general terms are fine for laymen or non-specialists, but more precise terms are beneficial for experts in that field.

[-] sugar_in_your_tea@sh.itjust.works 2 points 6 months ago

Sure, specialists can and should use specialized terms. But that's not what articles like this are targeting. Keep that to symposiums and whatnot, and keep the general public vernacular simple to avoid confusion. That's all I'm saying.

[-] bassomitron@lemmy.world 1 points 6 months ago* (last edited 6 months ago)

Fair point. Though, the source is data center dynamics, which does seem a bit niche.

[-] sugar_in_your_tea@sh.itjust.works 1 points 6 months ago

I suppose, but the article has nothing to do with data centers and is written like any other news article on regular news sites. It's a little more tech focused, but still very accessible.

[-] ikidd@lemmy.world 0 points 6 months ago

Open Source Security Podcast with Josh Bresher and Kurt Sigfried. It's a pretty good source of news and discussion from a sysadmin perspective.

this post was submitted on 16 Jun 2024
228 points (96.7% liked)

Technology

60090 readers
2855 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS