The Latest in IT Security

Posts Tagged ‘hashes’

Bitcoins, a self-generated hash-based peer-to-peer currency with no centralized regulating body, are on a stratospheric trajectory, will it replace traditional legal tender as the currency of choice for cyber-nastiness? First, a little background. Bitcoins first surfaced in a white paper purportedly by Satoshi Nakamoto. While no one can trace his (her) exact identity, it seems […]

Read more ...

In a self-titled hack attack called “F**k FBI Friday” the hacking group known as LulzSec has published details on users and associates of the non-profit organization known as Infragard. Infragard describes itself as a non-profit focused on being an interface between the private sector and individuals with the FBI. LulzSec published 180 usernames, hashed passwords, […]

Read more ...

Sony has been hacked for the fifth time in four days. This time a vulnerability was discovered in the Canadian e-commerce site for their mobile phone division, Sony Ericsson. The purported attacker, @idahc_hacker, describes himself as a “Lebanese grey hat hacker.” Early this morning Pacific time in Canada he posted a database to pastebin.com containing […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments