Skip to main content

Home/ VITTAlearning/ Group items tagged secure

Rss Feed Group items tagged

Roland Gesthuizen

Free ride: students crack ticket algorithm - 0 views

  • other university students started looking at a public transport's ticketing system because they were fans of public transport and interested in how the data was encrypted. They were also interested in what protections were in place against malicious users creating fake tickets
  • they were already aware of the potential flaws, but it was a large and expensive operation to change the tickets
  • cryptography should be impossible to crack, even if a potential attacker or reverse engineer knows every detail about how it is implemented. This system on the other hand is relying completely on users not knowing how it is implemented, which may have been fine when it was introduced in the early '90s because much fewer people had access to the technology required to read the tickets, or computers fast enough to analyse the data
  •  
    "A team of university students in Sydney have cracked the secret algorithm used on Sydney's public transport tickets for buses, trains and ferries, which they say could allow them to print their own tickets. "
Roland Gesthuizen

Email snooping IT admins like 'Dracula in charge of the blood bank' - 0 views

  • IT administrators "can't help themselves" as soon as they have control and authority over IT assets
  •  
    "About 40 per cent of IT administrators go snooping through emails of employees, particularly those of high-level executives .. A company's IT admins have access to virtually every document company-wide - including executive files, payroll information and medical data - and many "can't help themselves" in gaining access to email"
Roland Gesthuizen

How China and Others Are Altering Web Traffic - Technology Review - 0 views

  •  
    ""Invisible" servers let governments quietly intercept and modify their citizens' online communications."
Roland Gesthuizen

The Little White Box That Can Hack Your Network | Wired Enterprise | Wired.com - 0 views

  •  
    the Pwn Plug is pretty much the last thing you ever want to find on your network - unless you've hired somebody to put it there. It's a tiny computer that comes preloaded with an arsenal of hacking tools. It can be quickly plugged into any computer network and then used to access it remotely from afar.
Roland Gesthuizen

xkcd: Network - 1 views

  •  
    Time is running out to build your own virtual machine powered, virus network.
Roland Gesthuizen

YouTube - Stuxnext (HUNGRY BEAST) - 0 views

  •  
    "In June 2010, a computer virus called Stuxnet was discovered lurking in the data banks of power plants, traffic control systems and factories around the world. Pandora's box has been opened; on the new battlefield the aggressors are anonymous, the shots are fired without starting wars and the foot soldiers can pull their triggers without leaving their desks."
Sanny Y

The Number One Computer Tech Support Service - 1 views

Computer Tech Support Service offers the most outstanding computer support service. They have friendly computer support technicians who are very skilled in giving accurate and fast solutions to my ...

Computer support service

started by Sanny Y on 13 Sep 11 no follow-up yet
Roland Gesthuizen

Offshore cloud privacy may be "impossible," says commissioner | Delimiter - 1 views

  • cloud computing was being used “increasingly” by Victorian agencies, in order to reduce capital and operational costs.
  • Given that many cloud computing service providers are in jurisdictions which do not have similar privacy or data protection laws, if a security breach occurs, an individual in Victoria will be powerless to take action against the cloud service provider and will only be able to complain to the Victorian government organisation
  • large organisations need to look in a more granular fashion at what sort of data they are interested in storing in the cloud — arguing that some data could be harmlessly stored offshore — compared with sensitive data
  •  
    "Victoria's privacy commissioner has issued a stark warning to government agencies about the use of cloud computing, warning that it may be "impossible" to protect personal information held about Australians when it was located offshore - or even just outside Victoria."
Roland Gesthuizen

Should I Change My Password? - 0 views

  •  
    ShouldIChangeMyPassword.com has been created to help the average person check if their password(s) may have been compromised and need to be changed. This site uses a number of databases that have been released by hackers to the public. No passwords are stored in the ShouldIChangeMyPassword.com database.
Roland Gesthuizen

A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It) - 2 views

  •  
    "Here's a closer look at how network snooping works and how to protect yourself from it."
‹ Previous 21 - 31 of 31
Showing 20 items per page