A selection of this week’s more interesting vulnerability disclosures and cyber security news. With demise of SHA-1 and it inevitable hits against active use, this article about Microsoft’s use of SHA-1 brings the thought; what do we know about the crypto used by any systems we purchase? Are we even aware that there could be something in there that might actually be broken or weak, if not now, but maybe in the future?

In other news…

Weekly Cyber Security News 03/03/2017
twitterlinkedinmail