Category: Uncategorized

1 526 527 528 529 3696 / 3700 POSTS
The SHA1 hash function is now completely unsafe

The SHA1 hash function is now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the s ...
What to expect from the Trump administration on cybersecurity

What to expect from the Trump administration on cybersecurity

Look for U.S. President Donald Trump's administration to push for increased cybersecurity spending in government, but also for increased digital surve ...

News: Change in Focus

Since its inception in 1999, SecurityFocus has been a mainstay in the security community. From original news content to detailed technical papers ...
Linux's Decade-Old Flaw: Major Distros Move To Patch Serious Kernel Bug

Linux's Decade-Old Flaw: Major Distros Move To Patch Serious Kernel Bug

The bug double-free is in the Linux kernel's implementation of Datagram Congestion Control Protocol. Image ...
Policy Experts Push To Make Vulnerability Equities Process Law

Policy Experts Push To Make Vulnerability Equities Process Law

The U.S. government’s role in vulnerability disclosures is a vital part of our national security and should be codified in law, said a group of policy ...

DMA Annual Conference

Thank you for that kind introduction. It’s a pleasure to be here. It’s clear talking to people here today that the DMA members are ICO customers. Your ...
1 526 527 528 529 3696 / 3700 POSTS