Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Microsoft Pushes Ahead With SHA-1 Deprecation

Microsoft is speeding ahead with plans to deprecate support for older SHA1-based certificates in the upcoming Windows 10 Anniversary Update due this summer.

Microsoft is speeding ahead with plans to deprecate support for older SHA1-based certificates in the upcoming Windows 10 Anniversary Update due this summer.

By February 2017, the software giant warned that both Microsoft Edge and Internet Explorer will block SHA-1 signed TLS certificates.

This effectively means that Microsoft Edge and Internet Explorer will no longer consider websites protected with a SHA-1 certificate as secure and Microsoft said it would remove the address bar lock icon for these sites. 

“These sites will continue to work, but will not be considered secure,” Microsoft said, noting that the change will be in upcoming Windows Insider Preview builds and will be deployed broadly this summer. 

SHA1, a very popular hasing function, has been proven insecure with some calculations showing that it can be broken by 2018 or 2021 depending on the computing resources available to attackers.

Microsoft’s latest update follows a similar move by Google to force Certificate Authorities and software vendors to issue certificates based on SHA2, which is much more resistant to collision attacks.

Mozilla has also announced plans to deprecate support for SHA1 by July 2016.

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.