Notas

[1] “The U.S. suffered its worst airpower loss since Vietnam last week and no one really noticed” The Atlantic Wire, 21/12/2012. <<

[2] “RockYou hack exposes names, passwords of 30M accounts” Computerworld, 15/12/2009. <<

[3] “RockYou hack: from bad to worse” TechCrunch, 14/12/2009. <<

[4] “Imperva releases detailed analysis of 32 million breached consumer passwords” Nota de prensa de Imperva, 21/01/2010. <<

[5] “Consumer password worst practices (PDF)” imperva.com <<

[6] “Microsoft India store hacked, user database exposed” PCWorld, 131/02/2012. <<

[7] Vea un ejemplo en esta página <<

[8] Register_user_sample.png <<

[9] “YouPorn data NOT exposed” blog.youporn.com, 22/02/2012 <<

[10] Datos procesados por Anders Nilsson (@nilssonanders), así como esta infografía <<

[11] Cuenta de Twitter de Kevin Mitnick 11/07/2012. <<

[12] “Yahoo! takes immediate action after hacker incident” ycorpblog.com, 13/07/2012. <<

[13] La web original https://d33ds.co/archive/yahoo-disclosure.txt ha sido desactivada. Existen copias en torrent, por ejemplo aquí <<

[14] “Statistics about Yahoo leak of 450 000 plain-text accounts” blog.eset.se, 12/07/2012. <<

[15] “Web de Yahoo! Voice comprometida: publicadas más de 450,000 cuentas” José A. Guasch. securitybydefault.com, 12/07/2012. <<

[16] “Important notice - security breach” androidforums.com, 10/07/2012. <<

[17] “More user passwords dumped, this time from alleged Blllabong.com hack” Ars Technica, 13/07/2012. <<

[17b] “More user passwords dumped, this time from alleged Blllabong.com hack” Ars Technica, 13/07/2012. <<

[18] nvidia.com - forums 12/07/2012. <<

[19] “Nvidia forums suspended after large-scale hack, 390,000 accounts at risk” The Verge, 13/07/2012. <<

[20] “Pinterest hacked. Hundreds of thousands of users are unknowing posting spam pins” llsocial.com, 17/03/2012. <<

[21] “Eight million email addresses and passwords spilled from gaming site Gamigo months after hacker breach” Forbes, 23/07/2012. <<

[22] “8.24 million Gamigo passwords leaked after hack” ZDNet, 23/07/2012. <<

[23] “Months later, Gamigo hacker takes dozy dump, exposes 8 million” The Register, 24/07/2012. <<

[24] “Philips databases pillaged and leaked SECOND time in a month” The Register, 31/08/2012. <<

[25] “Hackers roban más de 30,000 bytes de datos de AMD” bsecure.com.mx, 20/08/2012. <<

[26] “Hackers collect significant account details from Blizzard servers” Ars Technica, 10/08/2012. <<

[27] “Hacker claims breach of 50,000 accounts from Wall Street IT recruiting firm” Computerworld, 18/07/2012. <<

[28] “Hackers Leak Thousands of Passwords From Large Private BitTorrent Tracker” TorrentFreak, 19/09/2012. <<

[29] “Peru Domains Registrar hacked and 207116 Domain panel credentials leaked” The Hacker News, 20/10/2012. <<

[30] http://pastebin.com/yXN7uc6r 2/11/2012. <<

[31] “Adobe breach reportedly spills easy-to-crack password hashes” Ars Technica, 10/08/2012. <<

[32] “IInyección SQL – Descripción” Wikipedia.com <<

[33] “PlayStation Network security update” blog.us.playstation.com, 2/05/2011. <<

[34] http://thepiratebay.se/torrent/6443601 <<

[35] “An important message from Sony’s chief information security officer” blog.us.playstation.com, 211/10/2011. <<

[36] “John the Ripper password cracker” openwall.com <<

[37] “Ataque de contraseñas, password guessing - 1 de 2” Alejandro Ramos. securitybydefault.com, 8/03/2010. <<

[38] “Ataque de contraseñas, password cracking - 2 de 2” Alejandro Ramos. securitybydefault.com, 26/03/2010. <<

[39] “John the Ripper cracks slow hashes on GPU” Slashdot, 4/07/2012. <<

[40] About us Stratfor Global Intelligence <<

[41] “Stratfor is a joke and so is Wikileaks for taking it seriously” The Atlantic, 27/02/2012. <<

[42] http://wikileaks.org/the-gifiles.html. El diario Público se encargó de su publicación en España: http://www.publico.es/internacional/wikileaks <<

[43] “Battlefield Heroes data compromised by Lulzsec” battlefield4online.com, 26/06/2011. <<

[44] “LulzSec says goodbye, dumping NATO, AT&T, Gamer data” Forbes, 25/06/2011. <<

[45] “LinkedIn passwords leaked by hackers” BBC News, 6/06/2012. <<

[46] “6.5 million LinkedIn password hashes leaked” Hacker News, 6/6/2012. <<

[47] “Updating your password on LinkedIn and other account security best practices” blog.linkedin.com, 6/06/2012. <<

[48] “Update on compromised passwords” eharmony news, 6/06/2012. <<

[49] “Actualización sobre la seguridad de las contraseñas en Last.fm” lastfm.es, 7/06/2012. <<

[50] “Gcrack descifrando hashes con Google” Marc Rivero López. Caminando entre bits, 3/09/2012. <<

[51] “Taking steps to protect our members” blog.linkedin.com, 7/06/2012. <<

[52] “An update on taking steps to protect our members” blog.linkedin.com, 9/06/2012. <<

[53] La base de datos con los valores hash de los clientes de eHarmony está disponible en http://hacktalk.net/eharmony.txt (49,1 MB). <<

[54] “Brief analysis of the Gawker password dump” The Duo Bulletin, 12/12/2019 <<

[55] “Gawker top-250” duosecurity.com <<

[56] “The only secure password is the one you can’t remember” Troy Hunt, 21/03/2011. <<

[57] “Formspring springs a leak: 28 MILLION passwords reset after raid” The Register, 11/07/2012. <<

[58] “Modern password hashing for your software and your servers” openwall.com <<

[59] “A cryptanalytic time-memory trade-off (PDF)” Martin E. Hellman. IEEE Transactions on Information Theory 26, 401-406 (1980). <<

[60] “How rainbow tables work” Kestas Kuliukas, 11/12/2006. <<

[61] Tables ophcrack.sourceforge.net <<

[62] List of Rainbow Tables RainbowCrack Project <<

[63] Free rainbow tables - distributed rainbow table project <<

[64] Rainbow tables pwcrack.com <<

[65] https://www.cryptohaze.com <<

[66] “154 billion NTLM/sec on 10 hashes” Cryptohaze blog, 15/07/2012. <<

[67] “A brief Sony password analysis” Troy Hunt, 6/06/2011. <<

[68] “Report: analysis of the Stratfor password list” The Tech Herald, 2/02/2012. <<

[69] “10 (or so) of the worst passwords exposed by the LinkedIn hacks Ars Technica, 6/06/2012. <<

[70] “Real-World passwords” Bruce Schneier. CryptoGram, 14/12/2006. <<

[71] “The science of guessing: analyzing an anonymized corpus of 70 million passwords (PDF)” Joseph Bonneau. 2012 IEEE Symposium on Security and Privacy <<

[72] “Using Twitter to build password cracking wordlist” 7 habits of highly effective hackers, 31/05/2012. <<

[73] “How I collect passwords” xato.net, 13/06/2011. <<

[74] “Passwords” skullsecurity.com 21/09/2011. <<

[75] “Florida man arrested in ‘Operation Hackerazzi’ for targeting celebrities with computer intrusion, wiretapping, and identity theft” Nota de prensa del FBI, 12/10/2011. <<

[76] “PIN analysis” datagenetics.com, 3/09/2012. <<

[77] “Trade group exposes 100,000 passwords for Google, Apple engineers” Ars Technica, 25/09/2012. <<

[78] “Important note regarding a change in your password” IEEE log, 25/09/2012. <<

[79] “Contraseña para sistema online de suministro de agua potable: '0-0-0-0' ss” DiarioTI.com, 9/09/2011 <<

>

[80] “Insurgents hack U.S. drones” The Wall Street Journal, 17/12/2009. <<

[81] “The great brazilian sat-hack crackdown” Wired, 20/04/2009. <<

[82] “WhatsApp al descubierto” securitybydefault.com, 5/01/2012. <<

[83] “Are my messages secure?” WhatsApp Support, 15/08/2012. <<

[84] “WhatsApp is using IEMI numbers as passwords” samgranger.com, 5/09/2012. <<

[85] “Lo que no te cuenta WhatsApp” Yago Jesús. securitybydefault.com, 9/06/2011. <<

[86] “Descifrando el fichero msgstore.db.crypt de WhatsApp” Alejandro Ramos. securitybydefault.com, 7/05/2012. <<

[87] “Finding Your iPhone’s Unique Identifier (UDID)” innerfence.com <<

[88] “Antisec leaks 1,000,001 UIUDs from a trove of 12 million allegedly stolen from an FBI laptop” TechCrunch, 4/09/2012. <<

[89] “Statement from BlueToad regarding the cyber attack suffered in the recent case of stolen Apple UDIDs” blog.bluetoad.com, 10/09/2012. <<

[90] “Apple Legacy filevault barn door… “ David I. Emery. cryptome.org, mayo 2012. <<

[91] “OS X Lion v10.7.3: Las contraseñas de las cuentas de usuario aparecen en los archivos de registro de FileVault Original y/o en los directorios de inicio de red” support.apple.com <<

[92] “Yahoo Axis Chrome extension leaks private certificate file” Nik Cubrilovic. nikcub.com, 24/05/2012. <<

[93] “Extensión Yahoo Axis para Chrome publica su clave privada” INTECO, 27/05/2012. <<

[94] “Outlook webmail passwords restricted to 16 chars - how does that compare with Yahoo and Gmail?” Naked Security, 2/08/2012. <<

[95] “Secret Microsoft policy limited Hotmail passwords to 16 characters” Ars Technica, 24/0972012. <<

[96] “Microsoft gives away Windows 8 Pro to pirates by accident” ZDNet, 21/11/2012. <<

[97] “De contraseñas demasiado complejas” Alejandro Ramos. securitybydefault.com, 22/08/2012. <<

[98] Datos del cliente: Registro, modificación, política de seguridad y confidencialidad elcorteingles.es <<

[99] “Millions of Virgin Mobile accounts at risk of password attacks” Ars Technica, 19/09/2012. <<

[100] “Virgin Mobile fails web security 101, leaves six million subscriber accounts wide open” Kevin Burke. kev.inburke.com, 17/09/2012. <<

[101] “Prince William photos slip-up forces MoD to change passwords” The Guardian, 20/11/2012. <<

[102] “A working day in the life of Flight Lieutenant Wales” Web oficial de los Duques de Cambridge, 20/11/2012. <<

[103] “Prince William photos accidentally reveal RAF password” Naked Security, 21/11/2012. <<

[104] “Security tip: When being interviewed on TV, make sure passwords aren’t written behind you” Naked Security, 10/05/2012. <<

[105] “Security tip: Before being interviewed on TV, wipe passwords off whiteboard” Naked Security, 24/08/2012. <<

[106] “Anonymous hacks Syrian President’s email. The password: 12345” Mashable, 7/02/2012. <<

[107] http://pastebin.com/uaYDfCz0 <<

[108] Greek Ministry of Finance credentials anompaste.me, 31/10/2012. <<

[109] “Keeping presidents in the nuclear dark (Episode #1:The case of the missing ‘Permissive Action Links’ ” [Archive.org - 29/06/2011] Bruce Blair’s Nuclear Column, 11/02/2004. <<

[110] “Russian military forces have ‘safe busting’ sledgehammer” RiaNovosti, 6/06/2012. <<

[111] http://cryptome.org/isp-spy/bios-spy.pdf <<

[112] http://www.accounttech.us/bios.htm<<

[113] http://www.pwcrack.com/bios.shtml <<

[114] Password Safe <<