NIST is planning a competition to develop one or more cryptographic 'hash' algorithms to augment and revise the current Secure Hash Standard (Federal Information Processing Standard 180-2). The ...
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware. Each instance of this trojan relies on the particular USB device on ...