Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged encryption hacking

Rss Feed Group items tagged

stone_edwards

Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement ... - 1 views

  •  
    Good article about lawful deciphers for "better" security
Tyren Herbst-Ingram

S. Carolina governor admits errors in hacking of tax records - 0 views

  •  
    South Carolina gets hacked due to "outdated" technology
Abbey Roberts

Dying cipher suites are stinking up TLS with man-in-the-middle vulns - 0 views

  •  
    Example of how improving technology requires new encryption that hasn't yet been cracked
ftiet21

China to launch hack-proof quantum communication network in 2016 - 2 views

  •  
    China will complete and put into service the world's longest quantum communication network stretching 2,000km from Beijing to Shanghai by 2016. By 2030, the Chinese network would be extended worldwide, Xinhua reported.
j_olsen

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
selleml1

CyberWarrior (@CyberDomain) | Twitter - 2 views

  •  
    I'm not sure about this one. Given the rate of tweets, I suspect a bot of some kind.
selleml1

Justin Wu (@hackapreneur) | Twitter - 0 views

  •  
    Here is another one I found. I don't think this one is a bot, but if it is let me know and I'll try to find another one.
1 - 10 of 10
Showing 20 items per page