wolfSSL exhibited at Xponential last month in Denver. While there, our team met some very kind and knowledgeable talent from “Dark Wolf Solutions” (Shout out, we love the name!) We discussed with Dark Wolf personnel how the unmanned drone industry is currently in its wild west days and there are many gaps to fill when […]
Read MoreMore TagAuthor: Kajal Sapkota
Live Webinar: Everything you Need to Know About DTLS 1.3
DTLS 1.3 is here! wolfSSL is the first to have DTLS 1.3 implementation and this is your chance to get all your questions answered! wolfSSL engineer, Marco Oliverio, will be hosting a live webinar on June 29th at 10am to share every information you need to know about DTLS 1.3. If you are looking for […]
Read MoreMore TagHow Much Battery Power Does TLS Use?
Power consumption on IoT devices can be a big concern. Especially when adding in the latest security and using DTLS 1.3 / TLS 1.3 connections to secure communication. Here at wolfSSL we minimize power consumption and work with EEMBC to measure how much power wolfSSL is consuming when adding security to battery powered designs. Benchmarks […]
Read MoreMore TagwolfSSL Release 5.6.3 Available!
wolfSSL release 5.6.3 is available. This is a minor release version that resolves an issue found when building with autoconf in release 5.6.2. Included in this release are 3 other improvements and fixes that increase the quality of code and ease of use of wolfSSL. The following is a list of all 4 items in […]
Read MoreMore TagwolfSSL Release 5.6.2 Available!
wolfSSL release 5.6.2 is now available! wolfSSL 5.6.2 brings many new features, exciting enhancements, fixes, and vulnerability fixes. Here at wolfSSL the developers are working diligently to achieve the highest level of security for users. Release 5.6.2 provides quality fixes which we were able to find and address by working quickly with independent researchers who […]
Read MoreMore TagwolfSSH: Post-Quantum Interoperability? Confirmed!
For people following the development of wolfSSH, they might have noticed something very strange recently. There is a new key exchange method that has a very long name: ecdh-nistp256-kyber-512r3-sha256-d00@openquantumsafe.org. This replaces ecdh-sha2-nistp256-kyber-512-sha256 which was similar but had some differences in data formatting. This name comes from the following IETF draft authored by Panos Kampanakis and Torben Hansen […]
Read MoreMore TagwolfEngine: wolfCrypt as an Engine for OpenSSL
Watch our live wolfEngine webinar, where we introduce one of our newest products wolfEngine, a separate standalone library which links against wolfSSL (libwolfssl) and OpenSSL. wolfEngine implements and exposes an OpenSSL engine implementation which wraps the wolfCrypt native API internally. Algorithm support matches that as listed on the wolfCrypt FIPS 140-2 certificate #3389. Learn about about […]
Read MoreMore TagwolfSentry integration with AUTOSAR Intrusion Detection System (IDS)
Hi! We have some of our automotive customers asking for wolfSentry integration with AUTOSAR IDS. Is this something that you need? If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.
Read MoreMore TagcURL User Survey 2023
This post has been cross posted from Daniel Stenberg’s blog – originally posted here. For widely used, widely distributed open source project such as curl, we often have little to no relation at all with our users and therefore it is hard to get feedback and learn what works and what is less good. Our best […]
Read MoreMore Tag“BUSted” – Everything you need to know on Side-channel attacks to TrustZone-M separation
“BUSted” – Everything you need to know on Side-channel attacks to TrustZone-M separation Watch the webinar here: “BUSted” – Everything you need to know on Side-channel attacks to TrustZone-M Separation Join our wolfSSL webinar about BUSted presented by wolfSSL engineer Daniele Lacamera as well as either Dr. Sandro Pinto or Cristiano Rodrigues. At the Black […]
Read MoreMore Tag
