Considering how many people actually use their birthday as their ATM pin, this is bad from a security standpoint.
A different kind of birthday attack
Tags:
Security
Similar Articles
Rules of Engagement in Cyberspace (97% Similar) - Rules of engagement is a concept familiar to most military personnels worldwide. The basic premise of having rules of engagement is to ensure an appropriate level of response or reaction to a ...
Infosec career progression (94% Similar) - What are the technical requirements to progress in your career in cybersecurity? How do you move from an entry level analyst position into a senior analyst position? Starting from the defensive ...
iPad POS (94% Similar) - While traveling in the US, I noticed that a considerable number of smaller food establishments used an iPad Point of Sale (POS) system. Given the number of POS vulnerabilities reported in the ...
Open letter to ICANN on PPSAI (92% Similar) - Subject: I may not need Domain Privacy, but others do! From: Benjamin LimDate: Fri, 3 Jul 2015 18:12:52 +0200 Dear ICANN, I will not attempt to speak on behalf of the ...