Computer Security, Links and Resources (1)

Next Post

Old and new resources, about computer security:

Experts Recover AES256 Encryption Key From a PC’s Electromagnetic Emissions
https://www.bleepingcomputer.com/news/security/experts-recover-aes256-encryption-key-from-a-pcs-electromagnetic-emissions/

Critical Vulnerability in JSON Web Encryption
https://auth0.com/blog/critical-vulnerability-in-json-web-encryption/

Differential Fault Attacks on Elliptic Curve Cryptosystems
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.107.3920&rep=rep1&type=pdf

Hackers’ Own Tools Are Full of Vulnerabilities
https://motherboard.vice.com/en_us/article/59pvp8/hackers-own-tools-are-full-of-vulnerabilities

Massive Database Leak Gives Us a Window into China’s Digital Surveillance State
https://www.eff.org/deeplinks/2019/03/massive-database-leak-gives-us-window-chinas-digital-surveillance-state

New TLS Padding Oracles
https://github.com/RUB-NDS/TLS-Padding-Oracles

@try_to_hack Makes History as First Bug Bounty Hacker to Earn Over $1 Million
https://www.hackerone.com/blog/trytohack-Makes-History-First-Bug-Bounty-Hacker-Earn-over-1-Million

How one teenager is making millions by hacking legally
https://www.bbc.com/news/av/technology-47407609/how-one-teenager-is-making-millions-by-hacking-legally

Angel “Java” Lopez
https://github.com/ajlopez
http://www.ajlopez.com
http://twitter.com/ajlopez

1 thought on “Computer Security, Links and Resources (1)

  1. Pingback: Computer Security, Links and Resources (2) | Angel ”Java” Lopez on Blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s