Day: February 27, 2017

Don't panic about SHA-1—fix it

Last week, Google unveiled proof that it had successfully created a collision attack against the SHA-1 hash algorithm, a security weakness long suspected to be exploitable with modern computing power. But what does that mean in practical terms? It depends on how you use SHA-1 and in what context. The answers to those questions provide

0Shares
Read More
What IT must do now that Cloudflare leaked user data

Once an item is exposed on the internet, it’s there forever. Although content delivery network Cloudflare has fixed the problem in its code that resulted in leaking customer data across the web, the incident is far from over for the millions of websites that rely on the company for security and content optimization services. What

0Shares
Read More