Sha

This Week's [in]Security - Issue 248 | insecurity | Control Gap
11 min read

This Week's [in]Security - Issue 248 | insecurity | Control Gap

Welcome to This Week’s [in]Security. Big-Hacks: Log4J, new RCE, the long road. New breaches: T-Mobile, Redline Stealer, Lastpass. New Ransomware:...

Read More >
This Week’s [in]Security - Issue 145 | insecurity | Control Gap
10 min read

This Week’s [in]Security - Issue 145 | insecurity | Control Gap

Welcome to This Week’s [in]Security. Online Skimming and PCI. CheckPeople.com breach. Ransomware and Password Theft. DNA collection. Apple vs. FBI...

Read More >
What The CIA WikiLeaks Dump Has In Common With PCI Compliance | blog,pci | Control Gap
1 min read

What The CIA WikiLeaks Dump Has In Common With PCI Compliance | blog,pci | Control Gap

In recent news, WikiLeaks exposed a huge trove of CIA documents. Journalists and bloggers will of course have a field day with this and the general...

Read More >
SHA-1 Is Dead!
2 min read

SHA-1 Is Dead!

History The SHA-1 cryptographic hash function was introduced in 1995. Weaknesses began to be discovered in 2005, and in 2011 NIST deprecated SHA-1. The...

Read More >