.. (לתיקייה המכילה) | ||
21.1.2010 - most popular password 123456 (following the story from 14.12.2009)BBBB | |
Imperva's report is available on http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf |
7.1.2010 - 768-bit RSA is broken BBBB | |
The paper: http://eprint.iacr.org/2010/006.pdf |
19.12.09 - "Iranian cyber army" hacks Twitter BBBB | |
The attack relied on changing DNS records (possibly by reseting Twitter admin password?) |
14.12.09 - SQL Injection Vulnerability reveals 32 million email accountsBBBB | |
The database details were published on a blog post http://igigi.baywords.com/rockyou-com-exposed-more-than-32-millions-of-passwords-in-plaintext/ (interesting to read the comments...) |
2.12.09 - bug and security problems turned 7 million debt to zeroBBBB | |
If you have time, go directly to the well-written verdict: http://www.netlaw.co.il/files/doc/ver_20091129_soi_v_halevi.pdf |
18.11.09 - Smartphones vulnerable to WiFi eavsdroppingBBBB | |
The original report is available on http://threatcenter.smobilesystems.com/wp-content/uploads/2009/11/MIMT-Whitepaper031.pdf |
14.11.09 - SSL renegotiation vulnerability used to hack Twitter accountsBBBB | |
Additional information about the vulnerability: http://extendedsubset.com/Renegotiating_TLS.pdf http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html |
29.10.09 - Podcast on social engineering (Ran Levi's "Making History" podcast)BBBB | |
(podcast 63 on http://www.icast.co.il/default.aspx?p=Podcast&id=50587&all=1) |
6.1.09 - Twitter hacked with online dictionary attackBBBB | |
More on this in Dictionary Attacks 101: http://www.codinghorror.com/blog/archives/001206.html |
2.1.2009 - An Israeli Domain Name registrar was "hacked"BBBB | |
This allowed the attackers to spoof Discount bank and ynetnews.com URLs. UPDATE (thanks to Yuri Rapoport): seems like Taub computer center was affected by this attack as well (see the attached image). |
17.9.2008 - Sarah Palin's mail account hackedBBBB | |
and that is probably the way it was done. |
23.2.2008 - Cold boot attack enables retrieving bitlocker encryption keysBBBB | |
Paper available on http://citp.princeton.edu/pub/coldboot.pdf |
6.12.07 - Cracking wireless keyboard encryptionBBBB | |
You cannot rely on the secrecy of the algorithm... |
30.11.07 - A feasable attack on MD5 hash functionBBBB | |
(or: how to predict the future with Sony Playstation 3) |
21.5.07 - A mighty number fallsBBBB | |
Factoring of a 307 digits number raises the bar for RSA encryption |
8.2.07 - An American Idol for Crypto GeeksBBBB | |
The U.S. National Institute of Standards and Technology is having a competition for a new cryptographic hash function. A single standard will be chosen by the end of 2011. |
23.1.07 - 'Storm' Trojan hits 1.6 Million PCsBBBB | |
This massively spammed trojan became the 1st MEDIUM risk virus for Symantec since 18 months. |
1.12.06 - Security and Fighting CrimeBBBB | |
Phone bugging, PGP and key loggers in the struggles between Mafia and law enforcement... |
12.6.06 - We are on the hackers' map.BBBB | |
This link has nothing to do with Tal Brody. |
12.6.06 - Are you the weakest link?BBBB | |
This link discusses social engineering. |
26.5.05 - A virus that wants ransom for your files.BBBB | |
This virus encrypts user files and then demands payment for the decryption key. |
6.4.05 - Jail time for Haifa post office hackerBBBB | |
Looking for a short hacking tutorial? Read the 15th talkback. |
14.3.05 - How to digitally sign your emailBBBB | |
This article describes how to add a digital signiture to your email. Read the second talkback before you decide to use it. |