Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to […]
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to […]
A pass-the-hash attack is an exploit in which an attacker steals a hashed user credential and — without cracking it […]
Copyright is a legal term describing ownership or control of the rights to use and distribute certain works of creative […]
Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. By […]
A certificate authority (CA) is a trusted entity that issues digital certificates to authenticate content sent from web servers. These […]
Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 […]
Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social […]
In September 2018, the dating app to match people with different ethnicities Color Dating suffered a data breach that was later redistributed as part of a larger corpus of data. The breach exposed 220k unique email addresses along with bios, names, profile photos and bcrypt password hashes. The data was provided to HIBP by a source who requested it be attributed to “ANK (Veles)”.
In October 2024, the flat earth sun, moon and zodiac app created by Flat Earth Dave was found to be leaking extensive personal information of its users. The data included 33k unique email addresses along with usernames, latitudes and longitudes (their position on the globe) and passwords stored in plain text. A small number of profiles also contained names, dates of birth and genders.
Multifactor authentication (MFA) is an IT security technology that requires multiple sources of unique information from independent categories of credentials […]