salt (2)

13450017701?profile=RESIZE_400xVolt.  Flax.  Salt.  Many typhoons have emerged in the last year and aren’t strictly related to the weather.  But, like their meteorological namesakes, they do cause catastrophic damage.  These typhoons are high-profile state-sponsored cyberattacks.  Recent incidents include exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet Service Providers (ISPs), to directly attack Singapore Telecommunications, representing part of ongoing cyberattacks against glo

Prepared by:  Nicholas Dessanti, UNH Cyber Student Intern

Password security has been a major topic of discussion for all computer and web site users.  Today, hackers are exploiting vulnerabilities within user passwords in many ways.  Brute force attacks are the most common way hackers use to find passwords.  Another common method is called a dictionary attack.  Both brute force and dictionary attacks systematically check all possible passwords until the correct one is found.  Hashing algorithms a