The Wonders of Hashing
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
UPDATE: A previous version of this article stated – citing a list on Github – that users on a site called HideMyAss were affected by Heartbleed. A spokesperson from that
Android devices store data on the SD card and the internal space where apps are kept.
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of
Mobile malware is the hottest topic among cybercriminals and the number of malicious mobile apps is rapidly growing. The reason for that is obvious – there are multiple ways to
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,
The criminals continue to do their bad business and law enforcement agencies successfully chase them down. That happens every month, so here are the most interesting cases from March. A
March brought with it a host of new security stories, and with those stories came our continued promise to keep you informed while providing protection against cybercriminals. From our interactive
Spring is when we reboot our life cycles, paring down and cleaning up our lives in anticipation of bigger, better things to come with warmer weather – and there’s no
In the news this month: more transparency reports, Microsoft zero days, data breaches, and NSA revelations. WhatsApp – the popular global messaging service – is acquired by Facebook, much to
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
In the days of cyberwars and cybermafia, it’s hard to recall times when computer viruses and worms were just research projects or pranks. Back then, there were no monetary incentive