Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Vulnerabilities

Rss Feed Group items tagged

chrisr22

The NSA Can Probably Break Tor's Encryption Keys - 0 views

  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
andrewhaygood97

Google Is Powering A New Search Engine That Digs Internet's Dirty Secrets - 1 views

  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
mackense

Business breaches, celeb photo hack raise online privacy concerns | The Buzz | www.acc... - 0 views

  •  
    The thing I found very interesting about this article is the discussion about ex-NBA owner Donald Sterling. Yes, his comments were horrifying, but he said things in the privacy of his home. I guess what I, and this article, are trying to say is that privacy is dead and all information is vulnerable.
estrutt

What Is SSL (Secure Sockets Layer)? | DigiCert.com - 2 views

  •  
    This website discusses procedure and purpose of encrypting sensitive data over the internet. SSL is a protocol which "determines variables of the encryption" being used to protect information from first names to credit card numbers. This website also tells you how to determine whether or not a website is secure or if your information is vulnerable. In addition, there is another page that delves into the mathematics and actual cryptography procedures behind online encryption like RSA and ECC.
leahrstr

Setting Up Your Tech on the Assumption You'll Be Hacked - 3 views

  •  
    Advice: Be careful with what information is stored on online devices. Always assume that the information can be leaked so you are never too vulnerable to an attack. Keep a strong password to protect your information
jacobsb

FERPA Compliance: Protecting Student Data through Encryption - Virtru - 0 views

  •  
    Schools have a responsibility to protect your information, but it can be vulnerable to release or data breaches. Be careful when giving out personal information and try to educate yourself on your rights as a student so that you can best protect yourself.
1 - 7 of 7
Showing 20 items per page