article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

SHA-1 was officially deprecated by NIST in 2011 and its usage for digital signatures was prohibited in 2013. Prepare a quantum-safe architecture now. Can the cybersecurity industry learn anything from the problems encountered with the move from the deprecated SHA-1 to the stronger and safer SHA-2 hashing algorithm?

article thumbnail

Making Chrome more secure by bringing Key Pinning to Android

Google Security

Chrome invests in an ever-stronger multi-process architecture built on sandboxing and site isolation to help defend against memory safety problems. This happened to Google in 2011, when the DigiNotar certification authority was compromised and used to issue malicious certificates for Google services.

Risk 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

From a GUI enterprise manager to advanced logical replication, backup and recovery, and a migration toolkit, EDB is a go-to vendor for all Postgre database administrators. Offline backups, ideally stored elsewhere, are especially critical to protecting data through disaster recovery. Also Read: Top Cloud Security Companies & Tools.

Firewall 117
article thumbnail

WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group

Fox IT

We have tracked the activities of the Evil Corp group for many years, and even though the group has changed its composition since 2011, we have been able to keep track of the group’s activities under this name. However, a bug is included in the architecture identification code. Attribution and Actor Background. Actor Tracking.

article thumbnail

FinSpy: unseen findings

SecureList

Kaspersky has been tracking deployments of this spyware since 2011. The 32-bit Trojan Loader, which is launched regardless of the victim machine architecture, checks if it is running on a 64-bit system. This script determines the victim machine architecture. This version was detected and researched several times up to 2018.