
“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
Related posts:
New U.S. Tax Regime is "Devastating," Experts Say
How one guy's $24 investment in bitcoins turned into an $886,000 payday
4 Year Old’s Veggie Garden Must Go, Says USDA Subcontractor
Obama Admin. Ignores Nullification: Federal Agents Will Enforce ObamaCare
In Profit-Sharing Scheme, Oklahoma DA Used Contractor for Highway Drug Stops
Investor under house arrest sends robot to Bitcoin convention instead
Maker Of Candy Crush Game Just Filed For A $500 Million IPO
Europe Puts on Its Rally Cap
How A Manhattan Jeweler Wound Up With Gold Bars Filled With Tungsten
The Man Who Lost $2 Million an Hour!
Lies the IMF Tells
Cyprus: 16 months of capital controls, banks still pitifully capitalized
The Office Of Propaganda And Censorship
DEA Bans Security Companies, Armored Cars From Serving Pot Dispensaries
FBI Director Blames Citizens with Cameras for Increase in Homicides