The bi-monthly release of CyaSSL, 2.8.0, is now ready to download from our website. New features include: – AES-GCM and AES-CCM use AES-NI – NetX default IO callback handlers – IPv6 fixes for DTLS Hello Cookies – The ability to unload Certs/Keys after the handshake, CyaSSL_UnloadCertsKeys() – SEP certificate extensions – Callback getters for easier […]
Read MoreMore TagMonth: August 2013
Recent Security Compromise in Android Apps using Java Cryptography Architecture (JCA)
Earlier this month, Google announced that a security compromise had been found which affects applications that improperly initialize, or fail to initialize completely, the PRNG (pseudorandom number generator) before using it for key generation, signing, or random number generation. On the Android Developers Blog, Alex Klyubin, Android Security Engineer, stated that “We have now determined […]
Read MoreMore TagCyaSSL and SEP 2.0
Hi! If you are interested in IoT and specifically security of IoT, then you’ll probably like this article on SEP 2.0. SEP stands for Smart Energy Profile. This note is just to let our users know that we’re following the evolution of the standard as it relates to SSL/TLS, and have provided our CyaSSL embedded […]
Read MoreMore TagUsing CyaSSL with Cavium NITROX Security Processors
CyaSSL now supports the Cavium NITROX processors, thus enabling CyaSSL users to take advantage of the incredible performance boosts provided by the NITROX family. Cavium’s NITROX processors combine cryptographic acceleration with the latest security algorithms. The NITROX PX family can deliver performance ranging from 500 Mbps to 2.5 Gbps for full SSL protocol offload, and […]
Read MoreMore TagFreeRTOS Web Server
Hi! wolfSSL`s Secure Embedded Web Server is now available for FreeRTOS. Let us know if you`re interested at facts@wolfssl.com.
Read MoreMore TagwolfSSL Fan Art by Steve Barker
Here at wolfSSL, we’re always excited to see fan art! Today we’d like to thank Steve Barker (https://plus.google.com/103515628980768116177/posts) for the rendition of our logo and tagline!
Read MoreMore TagKyle Wilhoit`s Industrial Control Honeypots presentation from Black Hat
One of the consistent themes at Black Hat is attacks on industrial control systems; which includes water plants, power plants, and oil refineries. One of the presentations was centered around using honeypots to determine the level of attack activity. An excellent article on the presentation and related material can be found here: http://gcn.com/Articles/2013/08/07/ics-honeypots.aspx?s=security_080813&admgarea=TC_SecCybersSec&Page=1 Some of […]
Read MoreMore TagExcellent SSL Deployment Guide from Qualys SSL Labs
Qualys put out an excellent SSL deployment best practices paper a few months ago. If you have not seen it, then check it out here: https://www.ssllabs.com/projects/best-practices/
Read MoreMore TagSSL and Home Automation
We are at Black Hat 2013 this week and have seen some really cool hacks. Today, we saw “Honey, I`m Home!! Hacking Z-Wave Home Automation Systems” presented by Behrang Fouladi and Sahand Ghanoun. They demonstrated how easy it is to unlock someone`s house with a laptop and a sub-$75 radio card. While you can encrypt […]
Read MoreMore Tag
