User Tools

Site Tools


ci2010:team2_bruce_schneier

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision Both sides next revision
ci2010:team2_bruce_schneier [2010/02/14 17:05]
lstarret
ci2010:team2_bruce_schneier [2010/02/14 17:16]
lstarret
Line 17: Line 17:
 [[http://​www.schneier.com/​blog/​archives/​2010/​02/​man-in-the-midd_1.html|Full Article]] [[http://​www.schneier.com/​blog/​archives/​2010/​02/​man-in-the-midd_1.html|Full Article]]
  
-//​Researchers found a way to exploit credit cards. Their system allows them to use stolen credit cards without knowing the PIN! This article demonstrates the importance of researches actually BREAKING security protocols on purpose as if they were criminals themselves. ​Notice the way the researches recorded ​the exploit on camera for all to see//:+//​Researchers ​(Computer Scientists, in fact) from Cambridge University ​found a way to exploit credit cards. Their system allows them to use stolen credit cards without knowing the PIN! This article demonstrates the importance of researches actually BREAKING security protocols on purpose as if they were criminals themselves. ​These researchers did just that by recording ​the exploit on camera for all to see//:
  
  
ci2010/team2_bruce_schneier.txt ยท Last modified: 2010/02/27 15:11 by lstarret