this post was submitted on 23 Jun 2025
1205 points (98.5% liked)

Technology

72577 readers
4678 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
you are viewing a single comment's thread
view the rest of the comments
[–] KazuyaDarklight@lemmy.world 221 points 2 weeks ago (22 children)

Unclear from the article but, while a bit pedantic, this sounds more like it was potentially a DDoS attack rather than a proper "hack".

[–] uninvitedguest@lemmy.ca 129 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

In an age where "willfully giving out your account password" is called hacking, here I'd call it tomato or tomato.

[–] JasonDJ@lemmy.zip 81 points 2 weeks ago (5 children)

Social Engineering is hacking cmv.

[–] OldManBOMBIN@lemmy.world 20 points 2 weeks ago

No, because I agree.

[–] Venus_Ziegenfalle@feddit.org 4 points 2 weeks ago* (last edited 2 weeks ago)

There's usually an element of that with cracking passwords. Even if you just try and pick a good wordlist for a target you're already engaging in a way. The more you know about them the shorter the wordlist. And if you spend enough time getting to know shit about them you can reduce the wordlist to one entry because they told you the password. In a way. It's not necessarily a completely different process is my point.

[–] nickwitha_k@lemmy.sdf.org 1 points 2 weeks ago

It was hacking according to Kevin Mitnick (RIP) so, it's probably safe to say that your view doesn't need to be changed.

[–] UnderpantsWeevil@lemmy.world 1 points 2 weeks ago (2 children)

You can argue it's a classic ID-10T error in your workflow.

But nobody has discovered a security vulnerability within the system architecture. This is the system operating as designed, abet with the wrong person standing in front of the terminal.

[–] em2@lemmy.ml 11 points 2 weeks ago (1 children)

That's called a PICNIC - Problem In Chair Not In Computer.

[–] Krudler@lemmy.world 11 points 2 weeks ago
[–] catloaf@lemm.ee 3 points 2 weeks ago (1 children)

That's cracking, not hacking. If you're going to be pedantic, be correct.

[–] UnderpantsWeevil@lemmy.world 1 points 2 weeks ago

However you want to phrase it, they're very different problems with different solutions.

"Someone picked the lock on my door and got into my house" is meaningfully distinct from "Someone stole my keys".

[–] prettybunnys@sh.itjust.works 20 points 2 weeks ago (1 children)

here I'd call it tomato or tomato.

It’s pronounced tomato

[–] KingJalopy@lemm.ee 5 points 2 weeks ago (1 children)
[–] UnderpantsWeevil@lemmy.world -1 points 2 weeks ago

You can keep your nasty chips

load more comments (19 replies)