Blog

The Importance Of Salted Hashes

June 24, 2014

After the security breach that resulted in LinkedIn, eHarmony and Yahoo Voices users having their password hashes being published, there has been talk about storing passwords with salts. What does this mean?

Read More

Embedded OS Leaks Chinese Passwords

June 24, 2014

The usernames and passwords for more than 10,000 job applicants for positions with China's State Administration of Foreign Experts Affairs are accessible to the outside world at loosely protected or unprotected computer servers operated by the Chinese government, according to a security researcher.

Read More

iPhone Hackers Can Gain Access to Your Passwords in 6 Minutes or Less

June 24, 2014

German researchers recently discovered how easy it is for someone to jailbreak your iPhone and reveal your passwords in six minutes. This type of hack doesn’t require the use of the phone’s passcode, mainly because the cryptographic key on current iOS devices operates independently from it.

The attack works based on existing vulnerabilities on Apple’s iPhone that enable access to the operating file system. Many of the passwords available to the attacker range from Google or Microsoft Exchange email accounts to VPN and WiFi access and more.

Read More

Hacking robots to turn into murderous gangs... more news at 11

June 24, 2014

A recent study investigates how inadequate security and privacy features make it possible to turn household robots into machines for spying and vandalism.

Read More
COMMENTS