As everyone waits for news of a bug in OpenSSL, here's a reminder that other cryptographic code in your life may also need patching!
...moreTotal Articles Found: 8
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2022-11-01 14:09:10
Popularity: 24
Author: Paul Ducklin
Keywords:
As everyone waits for news of a bug in OpenSSL, here's a reminder that other cryptographic code in your life may also need patching!
...morePublished: 2022-10-03 13:00:00
Popularity: 2
Author: Bas Westerbaan
Keywords:
Every connection we make post-quantum secure, we remove one opportunity for compromise: that's why we are announcing post-quantum Cloudflare Tunnel to help you secure every connection to our network
...moreIn March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.
...morePublished: 2021-08-27 01:03:21
Popularity: 44
Author: Paul Ducklin
Keywords:
The buggy code's in there, alright. Fortunately, it's hard to get OpenSSL to use it even if you want to, which mitigates the risk.
...morePublished: 2020-02-27 04:07:18
Popularity: 990
Author: Tara Seals
Keywords:
The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.
...morePublished: 2020-02-04 09:04:08
Popularity: None
Author: m4ttlewis
Keywords:
During late January 2020, a hot topic surfaced between security professionals on an issue that has historically had different proposed solutions. This blog post seeks to explore these solutions and identify pragmatic approaches to risk reduction on this specific issue concerning Customer Premises Equipment (CPE) security. Two security researchers (Tom Pohl and Nick Starke) analysed … Continue reading Properly Signed Certificates on CPE Devices →
...morePublished: 2020-01-09 11:41:31
Popularity: 188
Author: Lisa Vaas
Keywords:
This could signal a renewed war between Apple and law enforcement over breaking encryption.
...morePublished: 2024-05-24 19:30:00
Popularity: None
Author: Eli Sohl
Keywords:
Let’s kick this off with some examples. Here’s a seamless loop illustrating CBC-mode encryption: Here’s a clip showing a code block being rewritten to avoid leaking padding information in error messages: Here’s an illustration of a block cipher operating in CTS mode: You may be surprised to learn that each of these illustrations was generated […]
...more