Category: Uncategorized
The SHA1 hash function is now completely unsafe
Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the s ...
What to expect from the Trump administration on cybersecurity
Look for U.S. President Donald Trump's administration to push for increased cybersecurity spending in government, but also for increased digital surve ...
Cloudflare Coding Error Spills Sensitive Data
Data Breach
'Cloudbleed' Leaked Data from Uber, 1Pass ...
News: Change in Focus
Since its inception in 1999, SecurityFocus has been a mainstay in the security community. From original news content to detailed technical papers ...
Linux's Decade-Old Flaw: Major Distros Move To Patch Serious Kernel Bug
The bug double-free is in the Linux kernel's implementation of Datagram Congestion Control Protocol.
Image ...
Policy Experts Push To Make Vulnerability Equities Process Law
The U.S. government’s role in vulnerability disclosures is a vital part of our national security and should be codified in law, said a group of policy ...
DMA Annual Conference
Thank you for that kind introduction. It’s a pleasure to be here.
It’s clear talking to people here today that the DMA members are ICO customers. Your ...