Security News > 2017 > February



SHA-1 is definitely, provenly dead, as a group of researchers from CWI Institute in Amsterdam and Google have demonstrated the first practical technique for generating a collision. What is SHA-1?...

If you want to know about which cyber defenses are most effective and which are a waste of money and resources, ask a hacker. And that’s just what Nuix researchers did. “During Black Hat USA and...

The security of open Wi-Fi hotspots has been a subject of great concern for years. But, would believe that we were overwhelmingly successful using Wi-Fi attacks dating back twelve years on the RSA...

The Intercept has a long article on the relationship between Palantir Technologies and the NSA, based on the Snowden documents....



Security solutions for IoT automotive telematics Building a secure automotive telematics platform to achieve a profitable business model for automakers and ecosystem partners is a challenging task...
