Researches from Google and CWI Amsterdam are announcing the first practical technique for generating a SHA-1 collision. Here is the summary of how they went about generating a collision. As a proof of the attack, they are releasing two PDFs that have identical SHA-1 hashes but different content.

Load More Related Articles
  • Join our Telegram DFIR group!

    Guys, we have created a Telegram group, where we will do our best to answer all your quest…
  • APT29 Domain Fronting With TOR

    Matthew Dunwoody from FireEye has published a research on how Russian nation-state attacke…
  • iOS 10 Security Guide

    This month Apple has updated iOS Security Guide, which may be very useful both for mobile …
Load More In News

Leave a Reply

Your email address will not be published. Required fields are marked *