Skip to main content

Home/ Groups/ Math 1111: Cryptography
1More

Hackers launch assault on Israeli government websites - 0 views

  •  
    Since Israel's bombardment of Gaza, 44 million hacking attempts have been made on Israeli government websites. This article discusses the details of the hacking attempts, and the extent of their success or failure.
1More

Senate bill rewrite lets feds read your e-mail without warrants | Politics and Law - CN... - 0 views

  •  
    Perfect timing for our discussion on Tuesday after break.
1More

Fairy wrens teach secret passwords to their unborn chicks to tell them apart from cucko... - 0 views

  •  
    An unexpected place for passwords to appear...
1More

Sony lets slip its PlayStation 3 Master Key - oops! - PS3 - News - HEXUS.net - 0 views

  •  
    Oops.
1More

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | W... - 1 views

  •  
    "Since the dawn of the information age, we've bought into the idea that a password, so long as it's elaborate enough, is an adequate means of protecting all this precious data. But in 2012 that's a fallacy, a fantasy, an outdated sales pitch. And anyone who still mouths it is a sucker-or someone who takes you for one."
1More

Bletchley Park News - 0 views

  •  
    "The remains of a World War Two carrier pigeon which was lost in action 70 years ago while delivering a top secret message over enemy lines has been found in a chimney in Bletchingley, Surrey. The skeleton of the bird has a small red cylinder attached to its foot which contains a mysterious cigarette paper sized coded message. The message is deemed so sensitive, that Codebreakers at GCHQ in Cheltenham are now frantically trying to decipher it."
1More

Siemens T-43 - 0 views

  •  
    A basic overview of the Siemens T-43 cipher machine used by the Germans, the first mixer machine of its kind.
1More

WWII pigeon message stumps GCHQ - 0 views

  •  
    Continuation of a story I posted a while ago. Britain's top code-breakers say they are stumped by a secret code found on the leg of a dead pigeon. .
1More

BBC News - Privacy project uses cryptography to reduce shared info - 0 views

  •  
    This article describes efforts to create an "electronic wallet" to make sharing confidential information more secure and efficient.
1More

National Security Agency Releases History of Cold War Intelligence Activities - 0 views

  •  
    Discusses some interesting undercover cryptography work during the Cold War era
1More

Al-Qaeda's Embrace of Encryption Technology: 2007-2011 - 0 views

  •  
    An overview of Al-Qaeda's use of encryption technology in their terrorist activities. Relevant to the debate about distributing powerful cryptography to everyone, including those with bad intentions.
1More

Why "security" keeps winning out over privacy - Salon.com - 0 views

  •  
    Discusses how the security side wins, however unfairly because many reasons are often flawed. 
1More

S. Carolina governor admits errors in hacking of tax records - 0 views

  •  
    South Carolina gets hacked due to "outdated" technology
« First ‹ Previous 581 - 600 Next › Last »
Showing 20 items per page