Hi! About 20% of our users are using CTaoCrypt to provide standalone cryptographic functionality, and about 80% of our users have not thought about using it that way. The purpose of this blog post is to inform users on how to use CTaoCrypt as a standalone library: 1. CTaoCrypt is available as a function set […]
Read MoreMore TagMonth: November 2010
SHODAN: Sentient Hyper-Optimized Data Access Network automates port scanning, simplifies exploiting embedded devices
“The Register” reported on using SHODAN to pinpoint embedded devices that are not properly secured yesterday. See http://www.theregister.co.uk/2010/11/02/scada_search_engine_warning/ for details. In summary, SHODAN can be used to quickly identify internet connected devices with known exploits. For us, it points to yet another reason why mobile and embedded systems developers should harden their devices with the […]
Read MoreMore Tag
