article thumbnail

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT).

CGI

There are many different definitions around Internet of Things and M2M, seeking to make a distinction. This is significant as it will be within the business market that the value for IoT will be recognised which will ultimately benefit the consumer with new services and enhanced life experience.

IoT 40
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

However, what if you could manufacture a hash collision? It's also a slower hashing algorithm; still totally unsuitable for storing user passwords in an online system, but it can have a hit on the consuming service if doing huge amounts of calculations. And for what? It's a nonsense argument.

Passwords 123
article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

Only 1 definitely hasn’t had data breached. Publicly disclosed data breaches and cyber attacks: full list This week, we found 38,846,799 records known to be compromised, and 140 organisations suffering a newly disclosed incident. 123 of them are known to have had data exfiltrated, exposed or otherwise breached.