Download free GDPR compliance checklist!

Exploit Fully Breaks SHA-1 encryption

Users of GnuPG, OpenSSL and Git could be in danger from an attack that’s practical for ordinary attackers to carry out.

A proof-of-concept attack has been pioneered that “fully and practically” breaks the Secure Hash Algorithm 1 (SHA-1) code-signing encryption, used by legacy computers to sign the certificates that authenticate software downloads and prevent man-in-the-middle tampering.

Source: Exploit Fully Breaks SHA-1, Lowers the Attack Bar | Threatpost