[1] “The U.S. suffered its worst airpower loss since Vietnam last week and no one really noticed” The Atlantic Wire, 21/12/2012. <<
[2] “RockYou hack exposes names, passwords of 30M accounts” Computerworld, 15/12/2009. <<
[3] “RockYou hack: from bad to worse” TechCrunch, 14/12/2009. <<
[4] “Imperva releases detailed analysis of 32 million breached consumer passwords” Nota de prensa de Imperva, 21/01/2010. <<
[5] “Consumer password worst practices (PDF)” imperva.com <<
[6] “Microsoft India store hacked, user database exposed” PCWorld, 131/02/2012. <<
[7] Vea un ejemplo en esta página <<
[9] “YouPorn data NOT exposed” blog.youporn.com, 22/02/2012 <<
[10] Datos procesados por Anders Nilsson (@nilssonanders), así como esta infografía <<
[11] Cuenta de Twitter de Kevin Mitnick 11/07/2012. <<
[12] “Yahoo! takes immediate action after hacker incident” ycorpblog.com, 13/07/2012. <<
[13] La web original https://d33ds.co/archive/yahoo-disclosure.txt ha sido desactivada. Existen copias en torrent, por ejemplo aquí <<
[14] “Statistics about Yahoo leak of 450 000 plain-text accounts” blog.eset.se, 12/07/2012. <<
[15] “Web de Yahoo! Voice comprometida: publicadas más de 450,000 cuentas” José A. Guasch. securitybydefault.com, 12/07/2012. <<
[16] “Important notice - security breach” androidforums.com, 10/07/2012. <<
[17] “More user passwords dumped, this time from alleged Blllabong.com hack” Ars Technica, 13/07/2012. <<
[17b] “More user passwords dumped, this time from alleged Blllabong.com hack” Ars Technica, 13/07/2012. <<
[18] nvidia.com - forums 12/07/2012. <<
[19] “Nvidia forums suspended after large-scale hack, 390,000 accounts at risk” The Verge, 13/07/2012. <<
[20] “Pinterest hacked. Hundreds of thousands of users are unknowing posting spam pins” llsocial.com, 17/03/2012. <<
[21] “Eight million email addresses and passwords spilled from gaming site Gamigo months after hacker breach” Forbes, 23/07/2012. <<
[22] “8.24 million Gamigo passwords leaked after hack” ZDNet, 23/07/2012. <<
[23] “Months later, Gamigo hacker takes dozy dump, exposes 8 million” The Register, 24/07/2012. <<
[24] “Philips databases pillaged and leaked SECOND time in a month” The Register, 31/08/2012. <<
[25] “Hackers roban más de 30,000 bytes de datos de AMD” bsecure.com.mx, 20/08/2012. <<
[26] “Hackers collect significant account details from Blizzard servers” Ars Technica, 10/08/2012. <<
[27] “Hacker claims breach of 50,000 accounts from Wall Street IT recruiting firm” Computerworld, 18/07/2012. <<
[28] “Hackers Leak Thousands of Passwords From Large Private BitTorrent Tracker” TorrentFreak, 19/09/2012. <<
[29] “Peru Domains Registrar hacked and 207116 Domain panel credentials leaked” The Hacker News, 20/10/2012. <<
[30] http://pastebin.com/yXN7uc6r 2/11/2012. <<
[31] “Adobe breach reportedly spills easy-to-crack password hashes” Ars Technica, 10/08/2012. <<
[32] “IInyección SQL – Descripción” Wikipedia.com <<
[33] “PlayStation Network security update” blog.us.playstation.com, 2/05/2011. <<
[35] “An important message from Sony’s chief information security officer” blog.us.playstation.com, 211/10/2011. <<
[36] “John the Ripper password cracker” openwall.com <<
[37] “Ataque de contraseñas, password guessing - 1 de 2” Alejandro Ramos. securitybydefault.com, 8/03/2010. <<
[38] “Ataque de contraseñas, password cracking - 2 de 2” Alejandro Ramos. securitybydefault.com, 26/03/2010. <<
[39] “John the Ripper cracks slow hashes on GPU” Slashdot, 4/07/2012. <<
[41] “Stratfor is a joke and so is Wikileaks for taking it seriously” The Atlantic, 27/02/2012. <<
[42] http://wikileaks.org/the-gifiles.html. El diario Público se encargó de su publicación en España: http://www.publico.es/internacional/wikileaks <<
[43] “Battlefield Heroes data compromised by Lulzsec” battlefield4online.com, 26/06/2011. <<
[44] “LulzSec says goodbye, dumping NATO, AT&T, Gamer data” Forbes, 25/06/2011. <<
[45] “LinkedIn passwords leaked by hackers” BBC News, 6/06/2012. <<
[46] “6.5 million LinkedIn password hashes leaked” Hacker News, 6/6/2012. <<
[47] “Updating your password on LinkedIn and other account security best practices” blog.linkedin.com, 6/06/2012. <<
[48] “Update on compromised passwords” eharmony news, 6/06/2012. <<
[49] “Actualización sobre la seguridad de las contraseñas en Last.fm” lastfm.es, 7/06/2012. <<
[50] “Gcrack descifrando hashes con Google” Marc Rivero López. Caminando entre bits, 3/09/2012. <<
[51] “Taking steps to protect our members” blog.linkedin.com, 7/06/2012. <<
[52] “An update on taking steps to protect our members” blog.linkedin.com, 9/06/2012. <<
[53] La base de datos con los valores hash de los clientes de eHarmony está disponible en http://hacktalk.net/eharmony.txt (49,1 MB). <<
[54] “Brief analysis of the Gawker password dump” The Duo Bulletin, 12/12/2019 <<
[55] “Gawker top-250” duosecurity.com <<
[56] “The only secure password is the one you can’t remember” Troy Hunt, 21/03/2011. <<
[57] “Formspring springs a leak: 28 MILLION passwords reset after raid” The Register, 11/07/2012. <<
[58] “Modern password hashing for your software and your servers” openwall.com <<
[59] “A cryptanalytic time-memory trade-off (PDF)” Martin E. Hellman. IEEE Transactions on Information Theory 26, 401-406 (1980). <<
[60] “How rainbow tables work” Kestas Kuliukas, 11/12/2006. <<
[62] List of Rainbow Tables RainbowCrack Project <<
[64] Rainbow tables pwcrack.com <<
[66] “154 billion NTLM/sec on 10 hashes” Cryptohaze blog, 15/07/2012. <<
[67] “A brief Sony password analysis” Troy Hunt, 6/06/2011. <<
[68] “Report: analysis of the Stratfor password list” The Tech Herald, 2/02/2012. <<
[69] “10 (or so) of the worst passwords exposed by the LinkedIn hacks Ars Technica, 6/06/2012. <<
[70] “Real-World passwords” Bruce Schneier. CryptoGram, 14/12/2006. <<
[71] “The science of guessing: analyzing an anonymized corpus of 70 million passwords (PDF)” Joseph Bonneau. 2012 IEEE Symposium on Security and Privacy <<
[72] “Using Twitter to build password cracking wordlist” 7 habits of highly effective hackers, 31/05/2012. <<
[73] “How I collect passwords” xato.net, 13/06/2011. <<
[74] “Passwords” skullsecurity.com 21/09/2011. <<
[75] “Florida man arrested in ‘Operation Hackerazzi’ for targeting celebrities with computer intrusion, wiretapping, and identity theft” Nota de prensa del FBI, 12/10/2011. <<
[76] “PIN analysis” datagenetics.com, 3/09/2012. <<
[77] “Trade group exposes 100,000 passwords for Google, Apple engineers” Ars Technica, 25/09/2012. <<
[78] “Important note regarding a change in your password” IEEE log, 25/09/2012. <<
[79] “Contraseña para sistema online de suministro de agua potable: '0-0-0-0' ss” DiarioTI.com, 9/09/2011 <<
>[80] “Insurgents hack U.S. drones” The Wall Street Journal, 17/12/2009. <<
[81] “The great brazilian sat-hack crackdown” Wired, 20/04/2009. <<
[82] “WhatsApp al descubierto” securitybydefault.com, 5/01/2012. <<
[83] “Are my messages secure?” WhatsApp Support, 15/08/2012. <<
[84] “WhatsApp is using IEMI numbers as passwords” samgranger.com, 5/09/2012. <<
[85] “Lo que no te cuenta WhatsApp” Yago Jesús. securitybydefault.com, 9/06/2011. <<
[86] “Descifrando el fichero msgstore.db.crypt de WhatsApp” Alejandro Ramos. securitybydefault.com, 7/05/2012. <<
[87] “Finding Your iPhone’s Unique Identifier (UDID)” innerfence.com <<
[88] “Antisec leaks 1,000,001 UIUDs from a trove of 12 million allegedly stolen from an FBI laptop” TechCrunch, 4/09/2012. <<
[89] “Statement from BlueToad regarding the cyber attack suffered in the recent case of stolen Apple UDIDs” blog.bluetoad.com, 10/09/2012. <<
[90] “Apple Legacy filevault barn door… “ David I. Emery. cryptome.org, mayo 2012. <<
[91] “OS X Lion v10.7.3: Las contraseñas de las cuentas de usuario aparecen en los archivos de registro de FileVault Original y/o en los directorios de inicio de red” support.apple.com <<
[92] “Yahoo Axis Chrome extension leaks private certificate file” Nik Cubrilovic. nikcub.com, 24/05/2012. <<
[93] “Extensión Yahoo Axis para Chrome publica su clave privada” INTECO, 27/05/2012. <<
[94] “Outlook webmail passwords restricted to 16 chars - how does that compare with Yahoo and Gmail?” Naked Security, 2/08/2012. <<
[95] “Secret Microsoft policy limited Hotmail passwords to 16 characters” Ars Technica, 24/0972012. <<
[96] “Microsoft gives away Windows 8 Pro to pirates by accident” ZDNet, 21/11/2012. <<
[97] “De contraseñas demasiado complejas” Alejandro Ramos. securitybydefault.com, 22/08/2012. <<
[98] Datos del cliente: Registro, modificación, política de seguridad y confidencialidad elcorteingles.es <<
[99] “Millions of Virgin Mobile accounts at risk of password attacks” Ars Technica, 19/09/2012. <<
[100] “Virgin Mobile fails web security 101, leaves six million subscriber accounts wide open” Kevin Burke. kev.inburke.com, 17/09/2012. <<
[101] “Prince William photos slip-up forces MoD to change passwords” The Guardian, 20/11/2012. <<
[102] “A working day in the life of Flight Lieutenant Wales” Web oficial de los Duques de Cambridge, 20/11/2012. <<
[103] “Prince William photos accidentally reveal RAF password” Naked Security, 21/11/2012. <<
[104] “Security tip: When being interviewed on TV, make sure passwords aren’t written behind you” Naked Security, 10/05/2012. <<
[105] “Security tip: Before being interviewed on TV, wipe passwords off whiteboard” Naked Security, 24/08/2012. <<
[106] “Anonymous hacks Syrian President’s email. The password: 12345” Mashable, 7/02/2012. <<
[108] Greek Ministry of Finance credentials anompaste.me, 31/10/2012. <<
[109] “Keeping presidents in the nuclear dark (Episode #1:The case of the missing ‘Permissive Action Links’ ” [Archive.org - 29/06/2011] Bruce Blair’s Nuclear Column, 11/02/2004. <<
[110] “Russian military forces have ‘safe busting’ sledgehammer” RiaNovosti, 6/06/2012. <<
[114] Password Safe <<