cryptographic algorithm

Cryptocurrency Mining Is Booming, And So Is Its Malware

The cryptocurrency boom is underway. The talk of the town isn’t only about Bitcoin, the most popular form of digital cash. The value of some altcoins, including Monero (XMR), is steadily reaching new heights as well, adding more fuel to the furnace of the overall hysteria.

Dodging SHA-1’s Collision Course

Security researchers at the CWI institute in Amsterdam working together with a team from Google found a practical way to compromise the SHA-1 hash algorithm. The goal of this post on ITSPmagazine is to explain the impact of this finding and what can be done to mitigate the risk.