How do hackers break through encrypted data

839 views

How do they manage to do it when some simple encryptions are going to take years and the really good one (theoretically) centuries. Which other mean do they use except brute forcing?

In: 20

16 Answers

Anonymous 0 Comments

12+ years as a software engineer. There are 50 weak links that come before data encryption in terms of security liabilities. If a hacker can, say, steal your credentials via a phishing attack, you’re toast. And many other avenues of attack.

You are viewing 1 out of 16 answers, click here to view all answers.