7 News Story Topics
Remove Filter
|
|
An investigation by UKFast has revealed that it is possible to build a super-cracker computer for around the same price as your average low-spec budget desktop PC. Yet unlike your average budget PC, it is claimed that this cybercrime dream machine is capable of processing billions of password combinations per … |
|
The Apple iWork office productivity suite for the Mac has been around for ages, and was recently joined by an iOS version. iWork documents have, up until now, been seen as being pretty safe courtesy of the particular implementation of the 128-bit AES encryption Apple used to secure them. I … |
|
Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. … |
|
According to Russian forensic security experts and 'password recovery' specialists ElcomSoft, the days of protecting documents and files with 40-bit encryption are now officially over. It has now released a product which uses Thunder Tables technology to unlock password-protected documents that have been created using Microsoft Word. In fact, it … |
|
Nick Breese is a researcher with New Zealand based security outfit [URL="http://security-assessment.com/"]Security-Assessment.com[/URL] and found himself giving a presentation at the Kiwicon hacker conference in Wellington earlier this week. His presentation looked at the use of the PlayStation 3 games console to crack passwords, and Breese concluded that when compared to … |
|
Everyone was excited about the launch of a new range of iPods, everyone apart from Linux users of course. In its wisdom, [URL="http://www.apple.com"]Apple[/URL] decided to prevent media players other than iTunes from syncing with the MP3 devices, and in so doing locked out Linux users for whom there is no … |
|
Well, what a weekend that has been. Ever since the reports started emerging online of a brute force attack on the Vista activation code using a modified version of the original software license manager script file I have been, shall we say, dubious as to the authenticity of the claim. … |
The End.