Analysis of passwords in Sony security breach
A little over a week ago, Sony was hit yet again with another security breach — this time over one million passwords, that were stored in plain text, were released into the wild. Software architect...
View ArticlePassword reuse visualizer from Mozilla
When you use the same password for every online account, there could be trouble down the line if one of those sites was breached. You gotta mix it up these days. As part of their Watchdog initiative,...
View ArticleA surveillance system that watches over an entire city
Technology continues to advance quickly, but the social questions are lagging a bit. Radiolab explores the topic of we-can-but-should-we from the perspective of a surveillance system that watches an...
View ArticleLive cyber attack map
Norse monitors cyber attacks in real-time. This is their map of what's going on. (All I hear is pew, pew, pew when I watch it.) [via Boing Boing] Tags: Internet, security
View ArticleDangers of CSV injection
George Mauer highlights how a hacker might access other people’s data by putting an equal sign in a CSV file, so that an import to Microsoft or Google Sheets runs a value as a formula, even if it’s...
View ArticleTo get your personal data, provide more personal data
File another one under the sounds-good-on-paper-but-really-challenging-in-practice. Kashmir Hill, for The New York Times, describes the challenges of new laws that allow users to request the data that...
View ArticleInference of key shape from the sound it makes in the lock
Researchers from the National University of Singapore found a way to infer key shape based on the sound the lock makes when you insert the key. First they capture a sound recording with a standard...
View ArticleQuantum computing visual explainer
Quantum computing promises a higher level of processing power over current computers, but it comes with its own challenges with implementation. When it comes to fruition, it’ll also break current...
View Article
More Pages to Explore .....