Remove Consumer Services Remove IT Remove Mining Remove Risk
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

More than a decade ago now, I wrote about how Our Password Hashing Has no Clothes and in that post, showed the massive rate at which consumer-grade hardware can calculate these hashes and consequently "crack" the password. It works beautifully; it's ridiculously fast, efficient and above all, anonymous.

Passwords 123
article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

Source 1 ; source 2 (New) Professional services USA Yes 11,556 Poder Judicial de Santa Cruz Source (New) Legal Argentina Yes 8,732 J.D. Organisation(s) Sector Location Data breached?