Although a play on the recent privacy nightmare for many celebrities, this site and research is very interesting as they have performed the first successful collision attack on the SHA-1 hashing algorithm
Source: The Shappening
UA-67857327-1
CYBER DEFENCE PROFESSIONAL // MCIIS, CITP, MBCS, CISSP, CISM, CCSP, CASP
Although a play on the recent privacy nightmare for many celebrities, this site and research is very interesting as they have performed the first successful collision attack on the SHA-1 hashing algorithm
Source: The Shappening
Newly released USB POC device which will ‘burn’ or basically fry your motherboard within a few seconds of plugging it in. #wishlist
However, the second version of USB Killer dump -220V directly onto the signal lines of the USB interface, which is powerful enough to damage practically any computer with a USB port.Another major improvement in the new version of USB Killer is the reaction rate. Once plugged into a computer, USB Killer 2.0 takes only a few seconds for the PC to shut down and stop working.