Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

SHA-1 (Secure Hash Algorithm 1) Hash Function Broken Again by Researchers

SHA-1 (Secure Hash Algorithm 1) Hash Function Broken Again by Researchers Researchers from Google and the CWI Institute revealed that they had found a consistent way to break the cryptographic hash function SHA-1 (Secure Hash Algorithm 1) during a recent demonstration. The Secure Hash Algorithm is a family of cryptographic hash functions published by the […]

Cyber Security Predictions for 2017

Whether it was a billion compromised Yahoo accounts or state-sponsored Russian hackers muscling in on the US election, this past year saw hacks of unprecedented scale and temerity. And if history is any guide, next year should yield more of the same. It’s hard to know for certain what lies ahead, but some themes began […]

SHA-1 (Secure Hash Algorithm 1) Hash Function Broken Again by Researchers

SHA-1 (Secure Hash Algorithm 1) Hash Function Broken Again by Researchers Researchers from Google and the CWI Institute revealed that they had found a consistent way to break the cryptographic hash function SHA-1 (Secure Hash Algorithm 1) during a recent demonstration. The Secure Hash Algorithm is a family of cryptographic hash functions published by the […]

Cyber Security Predictions for 2017

Whether it was a billion compromised Yahoo accounts or state-sponsored Russian hackers muscling in on the US election, this past year saw hacks of unprecedented scale and temerity. And if history is any guide, next year should yield more of the same. It’s hard to know for certain what lies ahead, but some themes began […]