This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
ci2010:team2_bruce_schneier [2010/02/14 17:05] lstarret |
ci2010:team2_bruce_schneier [2010/02/14 17:16] lstarret |
||
---|---|---|---|
Line 17: | Line 17: | ||
[[http://www.schneier.com/blog/archives/2010/02/man-in-the-midd_1.html|Full Article]] | [[http://www.schneier.com/blog/archives/2010/02/man-in-the-midd_1.html|Full Article]] | ||
- | //Researchers found a way to exploit credit cards. Their system allows them to use stolen credit cards without knowing the PIN! This article demonstrates the importance of researches actually BREAKING security protocols on purpose as if they were criminals themselves. Notice the way the researches recorded the exploit on camera for all to see//: | + | //Researchers (Computer Scientists, in fact) from Cambridge University found a way to exploit credit cards. Their system allows them to use stolen credit cards without knowing the PIN! This article demonstrates the importance of researches actually BREAKING security protocols on purpose as if they were criminals themselves. These researchers did just that by recording the exploit on camera for all to see//: |