Security

NIST retires SHA-1 cryptographic algorithm due to vulnerabilities

The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST). ...

Internet

With Twitter in chaos, some ways to protect your account

Twitter is in chaos. Elon Musk, its new owner, has decimated its staff and this week gave those remaining an ultimatum—work grueling hours and be "extremely hardcore " or leave. Hundreds chose the latter and headed for ...

Security

Info expected to emerge slowly in hospital chain cyberattack

Details of an apparent cyberattack on one of the largest health systems in the U.S. were slow to emerge as security experts on Friday warned that it often takes time to assess the full impact on patients and hospitals.

Business

American Airlines testing face-scanning at DFW Airport

American Airlines said Wednesday that customers with PreCheck can go through security checkpoints at Dallas-Fort Worth International Airport with a face scan and phone app instead of showing their driver's license or passport.

Security

Using blockchain contracts to build botnets

Blockchain is a decentralized ledger technology that secures the integrity of transactions through digital signatures and will be familiar to anyone who has investigated digital or "crypto" currencies. The technology has ...

page 1 from 5