Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged security hacking

Rss Feed Group items tagged

Tyren Herbst-Ingram

S. Carolina governor admits errors in hacking of tax records - 0 views

  •  
    South Carolina gets hacked due to "outdated" technology
Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
Marco Tiburcio

Hackers launch assault on Israeli government websites - 0 views

  •  
    Since Israel's bombardment of Gaza, 44 million hacking attempts have been made on Israeli government websites. This article discusses the details of the hacking attempts, and the extent of their success or failure.
Allison Molo

Russia hack is not that scary - 0 views

  •  
    interesting read about how dangerous a hack could be
Riley Dankovich

Russian Hackers Behind World’s Biggest Internet Security Breach - NBC News.com - 0 views

  •  
    This video talks about a hack done by a group of Russian hackers that gained access to 1.2 billion records, and discusses the idea that perhaps passwords are no longer the best way to protect our information. It's a quick video, but what was interesting to me was that I hadn't even considered that something other than the current password system could protect our information.
mattgu123

35 per cent have upped online security following iCloud leak | Business Technology - 4 views

  •  
    Interesting that ~35% of 1000 surveyed have upped the strength of their passwords, but only 6% turned on two-factor ID, which was a major cause of the iCloud hacks going undetected for so long.
  •  
    It seems that two-factor authentication would not have prevented those iCloud hacks (according to this piece: http://www.tuaw.com/2014/09/02/think-iclouds-two-factor-authentication-protects-your-privacy/), but since Apple has now changed the triggers for two-factor to include things like iCloud access, two-factor will be more helpful going forward. So it is a little surprising that more people haven't enabled it.
  •  
    I'm also reminded of the ACLU's Chris Soghoian's point (https://www.aclu.org/blog/technology-and-liberty/lessons-celebrity-icloud-photo-breach) that one reason people have crappy Apple passwords is that Apple makes you use your password so darn often. I know I get frustrated when I have to enter my (crazy long) Apple password on my iPhone just to download a free app.
stone_edwards

Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement ... - 1 views

  •  
    Good article about lawful deciphers for "better" security
ftiet21

China to launch hack-proof quantum communication network in 2016 - 2 views

  •  
    China will complete and put into service the world's longest quantum communication network stretching 2,000km from Beijing to Shanghai by 2016. By 2030, the Chinese network would be extended worldwide, Xinhua reported.
csnell14

Facebook Hack Compromised 30 Million People, Exposing Phone Numbers, Emails - 0 views

  •  
    College students should be on the lookout for breaches in their social media accounts. In this digital age, college kids put most of their information on their social media accounts and should take the necessary precautions to create secure passwords.
Derek Bruff

On the Equifax Data Breach - Schneier on Security - 1 views

  •  
    Bruce Schneier on the Equifax hack
leahrstr

Setting Up Your Tech on the Assumption You'll Be Hacked - 3 views

  •  
    Advice: Be careful with what information is stored on online devices. Always assume that the information can be leaked so you are never too vulnerable to an attack. Keep a strong password to protect your information
whitnese

3Qs: Password and cloud security - 3 views

  •  
    This article discusses the recent cloud hacks and security questions in general.
j_olsen

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
jojodong

How to Protect Your Information Online - 0 views

  •  
    Advice: always assume that you are being hacked; use strong passwords; don't trust security questions to protect your data
1 - 20 of 26 Next ›
Showing 20 items per page