“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
Related posts:
Forget Terrorism: The Real Reason Behind The Qatar Crisis Is Natural Gas
Obama's Drug War: After Medical Marijuana Mess, Feds Face Big Decision On Pot
Two giant US pension funds admit there’s a BIG problem
TD Waterhouse Bank begins FATCA Hunt and embraces role as IRS deputy
Toppling Syria planned years ago
Fed Officials Recognized Upcoming 2007 Crisis But Weren't Worried
Antiwar protester thrown out of Kerry confirmation hearing
In Baltimore, Residents Support Martial Law
Does Jade Helm Violate Posse Comitatus?
Brave Police Save Town From Man Selling Veggies
California adds 500,000 renters while homeownership declines amidst a boom
The Verdict: Murder as an Official Entitlement
2013: Year Of The Bitcoin
Helping the Dow Industrial Average to Climb
Trump, Duterte, Congress, and the Philippine Drug War Killings