Researchers claim the "SHAttered attack" can be used to break anything that still uses the legacy SHA-1 cryptographic hash function. (Logo: Shattered.io) The Secure Hash Algorithm-1 - aka SHA-1 - ...