ISPs threatening non-compliance with 'voluntary code' A government code to force internet service providers to retain people's email and web browsing data as part of anti-terrorism legislation has ...
Attackers behind espionage software that infected Iranian computers targeted hard-to-exploit weaknesses in a cryptographic algorithm, a feat that allowed them to counterfeit a Microsoft digital ...
A recently announced SHA-1 collision attack has the potential to break code repositories that use the Subversion (SVN) revision control system. The first victim was the repository for the WebKit ...