Home Tags Algorithm

Tag: Algorithm

fMRI may sort intentional crimes from reckless crimes

Enlarge (credit: FBI) Convicting someone of a crime depends in part on the mental state of the criminal. We make a distinction between knowing...

Google reduces JPEG file size by 35%

Enlarge (credit: Harry Langdon/Getty Images) Google has developed and open-sourced a new JPEG algorithm that reduces file size by about 35 percent—or alternatively, image...

PetrWrap: the new Petya-based ransomware used in targeted attacks

This year we found a new family of ransomware used in targeted attacks against organizations.After penetrating an organization’s network the threat actors used the...

Time’s up for SHA-1 hash algo, but one in five websites...

Google, Microsoft and Mozilla say they won't trust anyone who hasn't migrated One in five websites (21 per cent) are still using certificates signed...

Google’s ‘SHA-1 Countdown Clock’ Could Undermine Enterprise Security

In the wake of a recently documented 'collision' attack, Google researchers should release a patch for the cryptographic Secure Hash Algorithm 1 sooner rather...

Computer conquers poker using GTX 1080 video card

Enlarge (credit: Montana Department of Justice) At the end of January, Carnegie Mellon computer scientists achieved a major milestone: their algorithm, Libratus, beat...

SHA-1 crack just got real: System Centre uses it to talk...

So Microsoft has just explained how to deprecate old certs and move to SHA 256 When Google revealed last week that it had destroyed...

SHA-1 crack just got real: System Center uses it to talk...

No immediate danger, but Microsoft wants you to deprecate old certs When Google revealed last week that it had destroyed the SHA-1 algorithm, it...

Torvalds Downplays SHA-1 Threat to Git

The ramifications of the recent SHA-1 collision attack have extended to Git and the Apache Subversion repository, both of which rely on the outdated...

BrandPost: Are We Done Tuning Our Application Yet? Roofline Analysis Helps...

How can we, as software developers, make our Big Data or High Performance Computing (HPC) application run faster? And when do we know that...

Don’t panic about SHA-1—fix it

Last week, Google unveiled proof that it had successfully created a collision attack against the SHA-1 hash algorithm, a security weakness long suspected to...