Since 1977, RSA public-key encryption has protected privacy and verified
authenticity when using computers, gadgets and web browsers around the globe,
with only the most brutish of brute force efforts (and 1,500 years of processing
time) felling its 768-bit variety earlier this year. Now, three eggheads (or
Wolverines, as it were) at the University of Michigan claim they can break it
simply by tweaking a device's power supply. By fluctuating the voltage to the
CPU such that it generated a single hardware error per clock cycle, they found
that they could cause the server to flip single bits of the private key at a
time, allowing them to slowly piece together the password. With a small cluster
of 81 Pentium 4 chips and 104 hours of processing time, they were able to
successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system,
without damaging the computer, leaving a single trace or ending human life as we
know it.
-
Casual hack: Hacking the NevoSoft games
Casual game is a kind of computer game designed for a wide range of users. The term "… -
Microsoft touts HTML5 as the core of next year`s Internet Explorer 9
Ryan Gavin, Microsoft's senior director of Internet Explorer, is remarkably chirpy for a … -
Knocked-Out AOL: How The AOL Servers Were Hacked
AOL Corporation has always been a kind of honey pie for all possible kinds of hackers. Mi… -
How to peep in other laptop built-in webcam: Learn how to use a built-in webcam for one’s own purposes
Some people truly believe their laptop built-in webcams can pry them so they fearfully be… -
Hackers tap into ECU to kill engine, brakes and more
During the 17 years this writer worked on braking and stability control systems, we occas… -
Air colander: A tale about how one large wireless provider was hacked
Admit that "Wireless Internet in every home" is a very attractive slogan. It so…
-
7 steps from Injection to the Admin Access via RDP
Any break-in pursues its own aim, which determines its value. It's up to you to decide wh… -
Ex-employees are a major threat to security — survey
Research carried out by Bell Micro, the IT systems distributor, claims to show that 67% o… -
Hordes of new threats ahead for mobile networks
Malware on smartphones is just the first in a series of new security threats for mobile n… -
Scammers scrape RAM for bank card data
Forget keyloggers and packet sniffers. In the wake of industry rules requiring credit car… -
First Programmable Quantum Computer Created
Quantum processing units are fundamentally different in a number of ways. First, where a … -
DDoS attack on DNS hits Amazon and others briefly
Internet users in Northern California were unable to reach properties including Amazon.co…