Posts

Side Channel Attacks: How to exploit vulnerabilities of processors?

,
Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work…
cybersécurité, attaques informatiques, attacks

Governments, banks, and hospitals: all victims of cyber-attacks

,
Hervé Debar, Télécom SudParis – Institut Mines-Télécom Cyber-attacks are not a new phenomenon. The first computer worm distributed via the Internet, known as the “Morris worm” after its creator, infected 10% of the 60,000…
passwords

Passwords: security, vulnerability and constraints

,
Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style="normal" top="20" bottom="20"] What is a password? A password is a secret linked to an identity. It associates two elements, what we…