Understanding Hashing Algorithms: A Beginner's Guide

Understanding Hashing Algorithms: A Beginner’s Guide

Understanding the importance of hashing algorithms in securing your data, different types of hashing algorithms, and their unique features ...

API’s Are Leaving Digital Banking Services Unlocked

How to Address the Vulnerabilities in Open Banking Major cyberattacks have made international news repeatedly over the last years, and there is no indication that cyberattacks will be slowing down. It isn’t ...

The Top 6 Methods Hackers Use to Steal Your Passwords

Install one layer of cyber security protection, and suddenly there’s a whole new way bad actors have discovered to penetrate it. Staying on top of the latest password security methods can sometimes ...

How Cybercriminals Hack “Encrypted” Passwords

| | all posts, hashing, Password Security
Storing your passwords in cleartext is a bad idea because if your server gets hacked, all your user passwords are immediately visible to the attacker. To protect a database of passwords in ...
Hashing functions

Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between hashing, encryption, ...

How Deep Learning Is Making Computers Better at Guessing Your Passwords

Recently, researchers from The New York Institute of Technology and the Stevens Institute of Technology computer science department released a paper about using a relatively new machine learning technique to make computers ...

Secure Guardrails