Please join us for our informative webinar titled “Enhanced Security: SM Ciphers Integration with wolfSSL,” scheduled for May 23rd at 2 pm PT. This session, led by wolfSSL Senior Software Engineer Sean Parkinson, will explore the integration of SM Ciphers and their effective employment within the wolfSSL framework. Sean will provide in-depth insights into the […]
Read MoreMore TagMonth: May 2024
Participate Now | curl User Survey 2024
We are excited to announce the opening of the 11th annual curl user survey 2024. As part of our ongoing commitment to enhance your experience and adapt to community needs, we invite all curl and libcurl users to share their invaluable feedback. Take the Survey This survey serves as the primary channel to connect with […]
Read MoreMore TagMQTT v5.0 versus v3.1.1
wolfMQTT was updated to support the draft MQTT v5.0 version of the specification in 2018. The specification was finalized in 2019, and wolfSSL has been a proponent of the new version ever since! Enhanced Session Management: MQTT v5.0 introduces improved session management, allowing clients to resume sessions seamlessly. This feature ensures continuity and reliability, especially […]
Read MoreMore TagwolfSSL now supported on PlatformIO
The best encryption libraries are now available on the PlatformIO environment! At wolfSSL, we continue to embrace rapid prototyping environments, including Arduino, Visual Studio, and now PlatformIO for VS Code, among other IDE applications. There are hundreds of boards supported by PlatformIO on numerous frameworks and platforms. We are providing two different Official wolfSSL libraries: […]
Read MoreMore TagWhat is the difference between AES and ECC?
AES (Advanced Encryption Standard) and ECC (Elliptic Curve Cryptography) are both cryptographic algorithms used for securing data, but they operate in different ways and serve different purposes: AES (Advanced Encryption Standard) AES is a symmetric encryption algorithm, meaning the same key is used for both encryption and decryption. It operates on blocks of data and […]
Read MoreMore TagwolfCrypt JCE Provider and JNI Wrapper 1.6.0 Now Available
wolfCrypt JNI/JCE 1.6.0 is now available for download! wolfCrypt JNI/JCE provides Java-based applications with an easy way to use the native wolfCrypt cryptography library. The thin JNI wrapper can be used for direct JNI calls into native wolfCrypt, or the JCE provider (wolfJCE) can be registered as a Java Security provider for seamless integration underneath […]
Read MoreMore TagElevate Your Cybersecurity Skills: Master wolfSSL, DTLS 1.3, and FIPS with Comprehensive Training Videos
In today’s fast-paced world, staying ahead of the curve isn’t just advantageous—it’s essential. Continuous learning is key to personal and professional growth. At wolfSSL, we recognize this need, which is why we host webinars featuring tailored training courses for various skill levels. Our software engineers guide you through the fundamentals to advanced features, empowering you […]
Read MoreMore TagJoin Our Live Webinar: Benchmarks with wolfSSL
Get excited for the upcoming webinar on ‘Benchmarks with wolfSSL,’ scheduled for May 16th at 10am PT. Led by wolfSSL Senior Software Engineer Jacob Barthelmeh, this session is set to be a deep dive into SSL/TLS performance optimization techniques. During the webinar, Jacob will demonstrate how the wolfSSL embedded SSL/TLS library excels in various hardware […]
Read MoreMore TagwolfSSL JSSE Provider and JNI Wrapper 1.13.0 Now Available
wolfSSL JNI/JSSE 1.13.0 is now available for download! wolfSSL JNI/JSSE provides Java-based applications with an easy way to use the native wolfSSL SSL/TLS library. The thin JNI wrapper can be used for direct JNI calls into native wolfSSL, or the JSSE provider (wolfJSSE) can be registered as a Java Security provider for seamless integration underneath […]
Read MoreMore TagVulnerability Disclosure: wolfSSH (CVE-2024-2873)
Affected Users: Anyone using wolfSSH server versions prior to release v1.4.17. Summary: It is possible for a malicious client to bypass user authentication when logging into a wolfSSH server. The wolfSSH server was not rigorous about checking the current state of the key exchange when handling channel open messages. wolfSSH’s example echoserver and the wolfSSHd […]
Read MoreMore Tag
