Laxaro

View the latest news and breaking news today

hash - Search

hash Searched from official sources arount the web with simple content and resource link From any languages in different countries.



don't panic about sha-1—fix it




last week, google unveiled proof that it had successfully created a collision attack against the sha-1 hash algorithm, a security weakness long suspected to be exploitable with modern computing power.but what does that mean in practical terms? it depends on how you use sha-1 and in what context. the...



researchers uncover powershell trojan that uses dns queries to get its orders




enlargeabraxas3dshare this storyresearchers at cisco's talos threat research group are publishing research today on a targeted attack delivered by a malicious microsoft word document that goes to great lengths to conceal its operations. based entirely on windows powershell scripts, the remote access...



researchers uncover powershell trojan that uses dns queries to get its orders




enlargeabraxas3dshare this storyresearchers at cisco's talos threat research group are publishing research today on a targeted attack delivered by a malicious microsoft word document that goes to great lengths to conceal its operations. based entirely on windows powershell scripts, the remote access...