Posts

Side Channel Attacks: How to exploit vulnerabilities of processors?
Digital, In the News
Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work…

Governments, banks, and hospitals: all victims of cyber-attacks
Digital, In the News
Hervé Debar, Télécom SudParis – Institut Mines-Télécom
Cyber-attacks are not a new phenomenon. The first computer worm distributed via the Internet, known as the “Morris worm” after its creator, infected 10% of the 60,000…

Passwords: security, vulnerability and constraints
Digital, In the NewsHervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay
[divider style="normal" top="20" bottom="20"]
What is a password?
A password is a secret linked to an identity. It associates two elements, what we…