Tag Archive for: Practical

Practical steps for strengthening your company’s password rules

Practical steps for strengthening your company's password rules

If we can build better rules for acceptable passwords, we can do a better job of protecting users’ privacy and confidential company databases.

Read more in my article on the Bitdefender Business Insights blog.

Graham Cluley

Practical SHA-1 Collision Months, Not Years, Away – Threatpost


Threatpost

Practical SHA-1 Collision Months, Not Years, Away
Threatpost
The most notorious MD5 collision was pulled off by the attackers behind the Flame malware. Like a state-sponsored attack, Flame used a MD5 collision to sign malware as if it were coming from Microsoft, and as a result, would be trusted. The Flame

and more »

flame malware – read more

Cyberwarfare: No New Ethics Needed – Practical Ethics (blog)

Cyberwarfare: No New Ethics Needed
Practical Ethics (blog)
In an interesting recent essay in the Atlantic – 'Is it Possible to Wage a Just Cyberwar?' – Patrick Lin, Fritz Allhoff, and Neil Rowe argue that events.

cyber warfare – read more