![Passwords and hacking: the jargon of hashing, salting and SHA-2 explained | Data and computer security | The Guardian Passwords and hacking: the jargon of hashing, salting and SHA-2 explained | Data and computer security | The Guardian](https://i.guim.co.uk/img/media/6a7b8b4e74e67dd34f2a93f775050d0f7e3529b3/0_107_4287_2572/master/4287.jpg?width=1200&height=900&quality=85&auto=format&fit=crop&s=154f27d13c40bd62b932ca8d283267f7)
Passwords and hacking: the jargon of hashing, salting and SHA-2 explained | Data and computer security | The Guardian
![Virus Bulletin on Twitter: "Sophos researchers have analysed a new ransomware actor that uses password-protected archives to bypass encryption protection. "Memento team" uses Python-based ransomware that the group has reconfigured after setbacks. Virus Bulletin on Twitter: "Sophos researchers have analysed a new ransomware actor that uses password-protected archives to bypass encryption protection. "Memento team" uses Python-based ransomware that the group has reconfigured after setbacks.](https://pbs.twimg.com/media/FEyheaPWUAEw2q2.jpg)
Virus Bulletin on Twitter: "Sophos researchers have analysed a new ransomware actor that uses password-protected archives to bypass encryption protection. "Memento team" uses Python-based ransomware that the group has reconfigured after setbacks.
![Mossad stole Iran's nuke archive and smuggled it back to Israel the same night | The Times of Israel Mossad stole Iran's nuke archive and smuggled it back to Israel the same night | The Times of Israel](https://static.timesofisrael.com/www/uploads/2018/05/000_14G2FR-1024x640.jpg)