Skip to main content

Home/ Groups/ Math 1111: Cryptography
Marco Tiburcio

Hackers launch assault on Israeli government websites - 0 views

  •  
    Since Israel's bombardment of Gaza, 44 million hacking attempts have been made on Israeli government websites. This article discusses the details of the hacking attempts, and the extent of their success or failure.
Derek Bruff

Senate bill rewrite lets feds read your e-mail without warrants | Politics and Law - CN... - 0 views

  •  
    Perfect timing for our discussion on Tuesday after break.
Derek Bruff

Fairy wrens teach secret passwords to their unborn chicks to tell them apart from cucko... - 0 views

  •  
    An unexpected place for passwords to appear...
Derek Bruff

Sony lets slip its PlayStation 3 Master Key - oops! - PS3 - News - HEXUS.net - 0 views

  •  
    Oops.
Derek Bruff

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | W... - 1 views

  •  
    "Since the dawn of the information age, we've bought into the idea that a password, so long as it's elaborate enough, is an adequate means of protecting all this precious data. But in 2012 that's a fallacy, a fantasy, an outdated sales pitch. And anyone who still mouths it is a sucker-or someone who takes you for one."
Derek Bruff

Bletchley Park News - 0 views

  •  
    "The remains of a World War Two carrier pigeon which was lost in action 70 years ago while delivering a top secret message over enemy lines has been found in a chimney in Bletchingley, Surrey. The skeleton of the bird has a small red cylinder attached to its foot which contains a mysterious cigarette paper sized coded message. The message is deemed so sensitive, that Codebreakers at GCHQ in Cheltenham are now frantically trying to decipher it."
Siegfried Schlunk

Siemens T-43 - 0 views

  •  
    A basic overview of the Siemens T-43 cipher machine used by the Germans, the first mixer machine of its kind.
Collin Jackson

WWII pigeon message stumps GCHQ - 0 views

  •  
    Continuation of a story I posted a while ago. Britain's top code-breakers say they are stumped by a secret code found on the leg of a dead pigeon. .
Hannah Lee

BBC News - Privacy project uses cryptography to reduce shared info - 0 views

  •  
    This article describes efforts to create an "electronic wallet" to make sharing confidential information more secure and efficient.
Sahand Kalhori

National Security Agency Releases History of Cold War Intelligence Activities - 0 views

  •  
    Discusses some interesting undercover cryptography work during the Cold War era
Justin Yeh

Al-Qaeda's Embrace of Encryption Technology: 2007-2011 - 0 views

  •  
    An overview of Al-Qaeda's use of encryption technology in their terrorist activities. Relevant to the debate about distributing powerful cryptography to everyone, including those with bad intentions.
Annie Vreeland

Why "security" keeps winning out over privacy - Salon.com - 0 views

  •  
    Discusses how the security side wins, however unfairly because many reasons are often flawed. 
Tyren Herbst-Ingram

S. Carolina governor admits errors in hacking of tax records - 0 views

  •  
    South Carolina gets hacked due to "outdated" technology
« First ‹ Previous 581 - 600 Next › Last »
Showing 20 items per page