Can you believe that a brand loyalty company would take two weeks to tell its loyal customers their data had been stolen? Oh, and that it wasn't encrypted, either?
What does this tell us about security? Find out in the latest episode of the Chet Chat...
Jens Steube, author of the pasword cracking tool hashcat, can make your SHA-1 password cracking tool 25% faster.
Just like that.
Five years, 64 entries and three rounds of cryptographic cook-off later, and we finally have a winner of the Secure Hash Algorithm 3 competition: Keccak.
We explain how it's different, and why, and we tell you how to pronounce it...
Microsoft has now gone public with additional information about the certificate forgery in the Flame malware. The attackers used an MD5 collision.
Learn more about hash collisions, and how to avoid them in your own IT environment.
We're into the back end of November, so you were probably thinking that nothing would have time to oust Stuxnet as computer security hyperbole of the year.
Seems you were wrong. The security news wires are abuzz with a new story.