Skip to content
bts-lpp.re
  • Home
  • Our posts
    • Crypto and ransomware
    • Passwords and security
    • Phishing
    • Social engineering
    • Tools about my identity
    • LessonsThe lessons we gave to different groups in school
  • Downloads
  • Legal mentions
  • Toggle website search
Menu Close
  • Home
  • Our posts
    • Crypto and ransomware
    • Passwords and security
    • Phishing
    • Social engineering
    • Tools about my identity
    • Lessons
  • Downloads
  • Legal mentions
  • Toggle website search

Our posts

  1. Home>
  2. Our posts>
  3. Page 12

Password security – Password Strength & Cracking Time

  • Post author:Group5
  • Post published:18/11/2025
  • Post category:Passwords and security

Password security has become a crucial issue in an era where cyberattacks are on the rise. This content explains how long it takes to hack a password based on its…

Continue ReadingPassword security – Password Strength & Cracking Time

Sécurité des mots de passe – MFA et protection supplémentaire

  • Post author:Group5
  • Post published:18/11/2025
  • Post category:Passwords and security

Image générer par l'intelligence artificielle Meta AI 1. Qu'est-ce que le MFA ? L’authentification Multifacteur (MFA) est une mesure de sécurité qui protège les individus et les organisations en exigeant que…

Continue ReadingSécurité des mots de passe – MFA et protection supplémentaire

Hameçonnage – Spear phishing et Whaling

  • Post author:Group4
  • Post published:18/11/2025
  • Post category:Phishing

Spear phishing / Whaling 1. Spear Phishing - Qu’est-ce que le Spear Phishing ? Le spear phishing est une forme ciblée de phishing. Selon le ministère français de l’Économie :…

Continue ReadingHameçonnage – Spear phishing et Whaling

Hameçonnage – Hameçonnage via QR code

  • Post author:Group4
  • Post published:18/11/2025
  • Post category:Phishing

1. Qu’est-ce qu’un QR Code ? À l’instar des codes-barres classiques, un QR code (Quick Response Code) est une image codifiée contenant des informations numériques. Son rôle principal est de servir de…

Continue ReadingHameçonnage – Hameçonnage via QR code

Social engineering

  • Post author:Group3
  • Post published:18/11/2025
  • Post category:Social engineering

The social engineering is a manipulation technics. Instead a direct attacks on you're computer its use psychological manipulation.Its used by hacker to obtained you're personnal data, you're bank accounts or…

Continue ReadingSocial engineering

Social engineering – Why Social Engineering Works

  • Post author:Group3
  • Post published:18/11/2025
  • Post category:Social engineering

- Most social engineering techniques do not require any technical skills from the attacker. - Everyone, from petty thieves to advanced attackers, can operate in this space. 1. What is…

Continue ReadingSocial engineering – Why Social Engineering Works

Password security – Strong Passwords

  • Post author:Group5
  • Post published:18/11/2025
  • Post category:Passwords and security

Passwords help protect our accounts and personal information online. If our passwords are weak, hackers can easily break into our accounts. This is why we need strong and safe passwords.…

Continue ReadingPassword security – Strong Passwords

Social engineering – Concrete examples of social engineering

  • Post author:Group3
  • Post published:18/11/2025
  • Post category:Social engineering

1. Phishing It's a fake message (email, SMS, social network...) which seems to be sent by a reputable firm, your bank, or a public administration and asks you to click on a…

Continue ReadingSocial engineering – Concrete examples of social engineering

Hameçonnage – Phishing dans un moteur de recherche

  • Post author:Group4
  • Post published:18/11/2025
  • Post category:Phishing

Le phishing dans les moteurs de recherche, aussi appelé empoisonnement SEO ou cheval de Troie SEO, consiste pour des cybercriminels à manipuler les résultats des moteurs de recherche afin de…

Continue ReadingHameçonnage – Phishing dans un moteur de recherche

Example of a post about crypto and ransomware

  • Post author:Vincent Pradel Fernandes
  • Post published:17/11/2025
  • Post category:Crypto and ransomware

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a…

Continue ReadingExample of a post about crypto and ransomware
  • Go to the previous page
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • Go to the next page

Recent Posts

  • Network monitoring
  • Surveillance réseaux
  • Social engineering
  • Audit
  • Pentest
  • Home
  • Downloads
  • Legal mentions
Copyright - WordPress Theme by OceanWP