Chunk

Encryption and Cybersecurity

a look at encryption, and it's importance in computer science and cyber security (privacy, etc)

29 resources in this chunk:

Article techcrunch.com

The quantum meltdown of encryption – TechCrunch - TechCrunch


Shlomi Dolev Contributor Shlomi Dolev is the Chair Professor and founder of the Computer Science department of Ben-Gurion University of the Negev. He is the author of Self-Stabi...

Saved by Course Chunks, and used in 2 chunks


Article simplesecurity.sensede...

Web Developer Security Checklist - Simple Security (2017)


Developing secure, robust web applications in the cloud is hard, very hard. If you think it is easy, you are either a higher form of life or you have a painful awakening ahead o...

Saved by Course Chunks, and used in 1 chunk


Article techcrunch.com

TechCrunch: website security - TechCrunch


Restaurant guide Zomato got off lightly after a hacker grabbed 6.6M user passwords

Saved by Course Chunks, and used in 1 chunk


Article wsj.com

Equifax CEO to Congress: Not Sure We Are Encrypting Data - WSJ


Wall Street Journal, 2017: "Two months after Equifax reported one of the worst data breaches in history, its interim chief executive told a congressional hearing Wednesday he w...

Saved by Course Chunks, and used in 2 chunks


Video youtu.be

Equifax: Last Week Tonight with John Oliver (HBO)


LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to mitigate the damage. John Oliv...

Saved by Course Chunks, and used in 2 chunks


Article nvlpubs.nist.gov

Application Container Security Guide - NIST


Application container technologies, also known as containers, are a form of operating system virtualization combined with application software packaging. Containers provide a po...

Saved by Course Chunks, and used in 2 chunks


Article inc.com

How To Prevent Fraud When You Can Not Trust Your Customers


Inc.com 2017 Last week's Uber breach is only the tip of the iceberg. Standard security is broken for good (and what you can do about it).

Saved by Course Chunks, and used in 1 chunk


Article technologyreview.com

$80 Million Hack Shows the Dangers of Programmable Money | MIT Technology Review (2016) - MIT Technology Review


A hacker lifted $80 million in digital currency from the DAO, showing the dangers of programmable money. A huge digital heist is a reminder that when your code has direct contr...

Saved by Course Chunks, and used in 2 chunks


Article medium.com/@tswriting

Sleep Walking into a War – Tobias Stone – Medium - Medium (2017)


We are 10 years into a war. A war most people don’t realise is happening, and which our governments are only just beginning to see. This is the Great Cyber War. If this was a co...

Saved by Course Chunks, and used in 1 chunk


Article hbr.org

How Machine Learning Can Help Identify Cyber Vulnerabilities - Harvard Business Review (2017)


Putting the burden on employees isn’t the answer. "Gartner expects worldwide spending on information security to reach $86.4 billion in 2017, growing to $93 billion in 2018, ...

Saved by Course Chunks, and used in 2 chunks


Article medium.com

Here’s Why Public Wifi is a Public Health Hazard – Medium - Medium (2014)


Maybe Better If You Don’t Read This Story on Public WiFi We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, what schools they attended, and ...

Saved by Course Chunks, and used in 4 chunks


Article govtech.com

Cyberattacks Increasingly Target Student Data


Schools in DeKalb County, Ga., see as many as 3,000 cyberattacks a day, according to the team trained to defend against them.

Saved by Course Chunks, and used in 2 chunks


Article nytimes.com

An ‘Iceberg’ of Unseen Crimes: Many Cyber Offenses Go Unreported - The New York Times


The country’s crime classification system is antiquated. Police commanders struggle with no data on an array of technology-based crimes.

Saved by Course Chunks, and used in 1 chunk


Article nytimes.com

The Myth of the Hacker-Proof Voting Machine - The New York Times


Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the internet.” But security experts point out crucial ways in whic...

Saved by Course Chunks, and used in 2 chunks


Article theconversation.com

Cryptojacking spreads across the web | The Conversation - The Conversation


Enterprising cryptocurrency enthusiasts have found a way to use your computer processor and electricity to make themselves money. What is cryptojacking, and how does it work?......

Saved by Course Chunks, and used in 3 chunks


Article coindesk.com

How Does Blockchain Technology Work? - CoinDesk - CoinDesk (2017)


As stated in our guide "What is Blockchain Technology?", there are three principal technologies that combine to create a blockchain. None of them are new. Rather, it is their or...

Saved by Course Chunks, and used in 3 chunks


Article wired.com

The WIRED Guide to Digital Security | WIRED - WIRED


In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contractor.

Saved by Course Chunks, and used in 2 chunks


Article telegram.org

Telegram (messaging app): 200,000,000 Monthly Active Users - Telegram (2018)


Telegram has reached 200 million monthly active users. More than 500,000 new users join daily. Telegram became the first messaging app to roll out end-to-end encryption to te...

Saved by Course Chunks, and used in 1 chunk


Article theconversation.com

Satellite sends quantum-spooky signals to Earth – raising hopes of secure global communications - The Conversation


The 'entangled' light particles spookily interact with each other at huge distances.

Saved by Course Chunks, and used in 4 chunks


Article insights.sei.cmu.edu

Security Begins at the Home Router


In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well as a number of announcements ...

Saved by Course Chunks, and used in 1 chunk


Article fivethirtyeight.com

Hacking The Electric Grid Is Damned Hard | FiveThirtyEight - FiveThirtyEight (2018)


The nightmare is easy enough to imagine. Nefarious baddies sit in a dark room, illuminated by the green glow of a computer screen. Meanwhile, technicians watch …

Saved by Course Chunks, and used in 1 chunk


Article news.gatech.edu

Georgia Tech Creates Cybersecurity Master’s Degree Online for Less Than $10,000


The Georgia Institute of Technology has announced a new online cybersecurity master’s degree that will be offered for less than $10,000 and delivered in collaboration with edX. ...

Saved by Course Chunks, and used in 2 chunks


Article coindesk.com

Coinbase Acquires Digital Identity Startup Distributed Systems - CoinDesk (2018)


Coinbase is advancing its push into developing a secure digital identity platform by acquiring San Francisco-based startup Distributed Systems.

Saved by Course Chunks, and used in 3 chunks


Article vox.com

An 11-year-old hacked a replica of Florida’s voting system in 10 minutes || Vox - Vox (2018)


The DEF CON hackathon highlights the real threats malicious hackers pose to our democracy.

Saved by Course Chunks, and used in 2 chunks


Article bbc.com

Marriott hack hits 500 million Starwood guests - BBC News - BBC News


The hotel chain says details of up to 500 million guests may have been accessed in a database breach.

Saved by Course Chunks, and used in 1 chunk


Article engadget.com

Inside Chronicle, Alphabet’s cybersecurity moonshot - Engadget


Fifteen years ago, cybersecurity could be boiled down to a simple strategy: Secure the perimeter. Experts fought against malware and other nefarious code by imp...

Saved by Course Chunks, and used in 2 chunks


Article crypto101.io

Crypto 101 - encryption (course)


Comes with everything you need to understand complete systems such as SSL/TLS: block ciphers, stream ciphers, hash functions, message authentication codes, public key encryptio...

Saved by Course Chunks, and used in 1 chunk


Article techcrunch.com

Goldman Sachs leads $8M round in cybersecurity skills platform Immersive Labs – TechCrunch - TechCrunch


Immersive Labs, a cybersecurity skills platform founded by former GCHQ researcher James Hadley, has raised $8 million in Series A funding. Leading the round is Goldman Sachs, wi...

Saved by Course Chunks, and used in 2 chunks


Article schub.io

VPN - a Very Precarious Narrative - Dennis Schubert


A VPN is a tunnel connecting two different networks. You throw traffic into one end of the tunnel, and it will come out somewhere else, even if the destination might not be reac...

Saved by Course Chunks, and used in 2 chunks


Visibility: Public (all visitors)

Saved by:
Collaboration:



Put this collection on your own site


Recent activity in this chunk:

Course Chunks added Article: "VPN - a Very Precarious Narrative - Dennis Schubert"
about 2 years ago

Course Chunks added Article: "Crypto 101 - encryption (course)"
over 2 years ago

Course Chunks added Article: "Inside Chronicle, Alphabet’s cybersecurity moonshot"
over 2 years ago

Course Chunks added Article: "Marriott hack hits 500 million Starwood guests - BBC News"
over 2 years ago

Course Chunks added Article: "Coinbase Acquires Digital Identity Startup Distributed Systems - CoinDesk"
over 2 years ago

Course Chunks added Article: "Hacking The Electric Grid Is Damned Hard | FiveThirtyEight"
over 2 years ago

Course Chunks added Article: "Security Begins at the Home Router"
over 2 years ago

This chunk is part of the following 2 Collections