Security

Report: Hackers using telecoms like 'global spy system'

An ambitious group of suspected state-backed hackers has been burrowing into telecommunications companies in order to spy on high-profile targets across the world, a U.S. cybersecurity firm said in a report published Tuesday ...

Security

NIST retires SHA-1 cryptographic algorithm due to vulnerabilities

The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST). ...

page 2 from 19