The Latest in IT Security

Posts Tagged ‘hashes’

It appears that some hackers got their hands on the database of passwords from LinkedIn. LinkedIn representatives have stated that they’re currently analyzing the reports. The good news is that the data dump in size of 271 MB that has been made available on a Russian forum only contains the SHA1 hashes of the passwords […]

Read more ...

DidierStevens.com – Did you know that you can search VirusTotal? You don’t have to submit a file, but you can search for the report of a file has been submitted before. You use a cryptographic hash (MD5, SHA1, SHA256) to identify the file.There are several tools to submit a batch of files to VirusTotal, but […]

Read more ...

While analyzing the components of Duqu, we discovered an interesting anomaly in the main component that is responsible for its business logics, the Payload DLL. We would like to share our findings and ask for help identifying the code. Code layout At first glance, the Payload DLL looks like a regular Windows PE DLL file […]

Read more ...


Categories

WEDNESDAY, APRIL 09, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments