![](https://media.kasperskydaily.com/wp-content/uploads/sites/85/2015/10/05131752/security-week-42-featured-700x459.jpg)
Security Week 42: SHA-1 collisions, a real hack for routers, Android/Security/Gloom
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
2 articles
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.