SHA-1 now broken
SHA-1 is a _hash algorithm_ that has been widely used in cryptography.
SHA-1 is a _hash algorithm_ that has been widely used in cryptography.
An important lesson about software testing - specifically the importance of testing software "in the wild".
"I've got nothing to hide so I've got nothing to fear from [insert surveillance program here]" is a commonly heard retort to concerns about our diminishing ability to keep our personal information private.
In their rush to Internet-enable their vehicles, some manufacturers appear to have neglected the security aspect of their systems.
In 1994 the source code for RC4 was leaked on the Internet, and it quickly became popular because of its simplicity and speed.
The United States is no longer regarded as a "safe harbour" for EU data - and that's big (and welcome) news for Europeans.
Details of a damaging hack of British phone and broadband provider TalkTalk's customer database are emerging.
Our previous post explained that the "nothing to hide, nothing to fear" argument is based on a narrow view of privacy that assumes it is primarily about concealing our wrongs.
Using SFTP public key authentication is a great step towards securing your sftp server.
Firewalls present challenges for users of FTP and (particularly) FTPS. The root cause of the problem is that a single session using these protocols requires more than one socket connection. …