< Back home

Chapter 6: Cybersecurity and Cryptocurrency

Password strength charts

Sources

https://elie.net/talk/deconstructing-the-phishing-campaigns-that-target-gmail-users/
https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
https://www.phishing.org/10-ways-to-avoid-phishing-scams
https://digitalguardian.com/blog/phishing-attack-prevention-how-identify-avoid-phishing-scams
https://www.malwarebytes.com/hacker/
https://selfkey.org/data-breaches-in-2019/
https://en.wikipedia.org/wiki/Identity_theft
https://www.guru99.com/how-to-crack-password-of-an-application.html
https://www.grc.com/haystack.htm
https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-used-by-hackers
https://en.wikipedia.org/wiki/Password_cracking
https://en.wikipedia.org/wiki/Password_cracking
https://www.itpro.co.uk/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
https://en.wikipedia.org/wiki/Password_cracking
https://www.investing.com/crypto/bitcoin/historical-data
https://www.businessinsider.com/dogecoin-hack-2014-5
https://en.wikipedia.org/wiki/Mt._Gox
https://en.wikipedia.org/wiki/Ethereum
https://en.wikipedia.org/wiki/The_DAO_
https://cointelegraph.com/explained/erc-20-tokens-explained
http://unenumerated.blogspot.com/2006/11/wet-code-and-dry.html
https://en.wikipedia.org/wiki/Public-key_cryptography
https://en.wikipedia.org/wiki/Diffie
https://security.stackexchange.com/questions/45963/diffie-hellman-key-exchange-in-plain-english/45984
https://en.wikibooks.org/wiki/Cryptography/Public_Key_Overview
http://www.cs.cornell.edu/courses/cs513/2006fa/lectures/lec05.html