.. (לתיקייה המכילה) | ||
6.1.09 - Twitter hacked with online dictionary attack | |
More on this in Dictionary Attacks 101: http://www.codinghorror.com/blog/archives/001206.html |
2.1.2009 - An Israeli Domain Name registrar was "hacked" | |
This allowed the attackers to spoof Discount bank and ynetnews.com URLs. UPDATE (thanks to Yuri Rapoport): seems like Taub computer center was affected by this attack as well (see the attached image). |
17.9.2008 - Sarah Palin's mail account hacked | |
and that is probably the way it was done. |
23.2.2008 - Cold boot attack enables retrieving bitlocker encryption keys | |
Paper available on http://citp.princeton.edu/pub/coldboot.pdf |
6.12.07 - Cracking wireless keyboard encryption | |
You cannot rely on the secrecy of the algorithm... |
30.11.07 - A feasable attack on MD5 hash function | |
(or: how to predict the future with Sony Playstation 3) |
21.5.07 - A mighty number falls | |
Factoring of a 307 digits number raises the bar for RSA encryption |
8.2.07 - An American Idol for Crypto Geeks | |
The U.S. National Institute of Standards and Technology is having a competition for a new cryptographic hash function. A single standard will be chosen by the end of 2011. |
23.1.07 - 'Storm' Trojan hits 1.6 Million PCs | |
This massively spammed trojan became the 1st MEDIUM risk virus for Symantec since 18 months. |
1.12.06 - Security and Fighting Crime | |
Phone bugging, PGP and key loggers in the struggles between Mafia and law enforcement... |
12.6.06 - We are on the hackers' map. | |
This link has nothing to do with Tal Brody. |
12.6.06 - Are you the weakest link? | |
This link discusses social engineering. |
26.5.05 - A virus that wants ransom for your files. | |
This virus encrypts user files and then demands payment for the decryption key. |
6.4.05 - Jail time for Haifa post office hacker | |
Looking for a short hacking tutorial? Read the 15th talkback. |
14.3.05 - How to digitally sign your email | |
This article describes how to add a digital signiture to your email. Read the second talkback before you decide to use it. |