Skip to the main content.
Contact
Contact

Blog

Be in touch with our latest news

SHA

11 min read

This Week's [in]Security - Issue 248

Welcome to This Week’s [in]Security. Big-Hacks: Log4J, new RCE, the long road. New breaches: T-Mobile, Redline Stealer, Lastpass. New Ransomware:...

Read More >

10 min read

This Week’s [in]Security - Issue 145

Welcome to This Week’s [in]Security. Online Skimming and PCI. CheckPeople.com breach. Ransomware and Password Theft. DNA collection. Apple vs. FBI...

Read More >

1 min read

What The CIA WikiLeaks Dump Has In Common With PCI Compliance

In recent news, WikiLeaks exposed a huge trove of CIA documents. Journalists and bloggers will of course have a field day with this and the general...

Read More >

2 min read

SHA-1 Is Dead!

History The SHA-1 cryptographic hash function was introduced in 1995. Weaknesses began to be discovered in 2005, and in 2011 NIST deprecated SHA-1....

Read More >