RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

wolfSSL STM32 Hardware Crypto and RNG Support

Did you know that the CyaSSL lightweight SSL library has support for hardware-based cryptography and random number generation offered by the STM32 processor? Supported cryptographic algorithms include AES (CBC, CTR), DES (ECB, CBC), 3DES, MD5, and SHA1. For details regarding the STM32 crypto and hash processors, please see the STM32F2xx Standard Peripheral Library document (linked […]

Read MoreMore Tag

CyaSSL Release 2.8.0 Now Available

The bi-monthly release of CyaSSL, 2.8.0, is now ready to download from our website.  New features include: – AES-GCM and AES-CCM use AES-NI – NetX default IO callback handlers – IPv6 fixes for DTLS Hello Cookies – The ability to unload Certs/Keys after the handshake, CyaSSL_UnloadCertsKeys() – SEP certificate extensions – Callback getters for easier […]

Read MoreMore Tag

Recent Security Compromise in Android Apps using Java Cryptography Architecture (JCA)

Earlier this month, Google announced that a security compromise had been found which affects applications that improperly initialize, or fail to initialize completely, the PRNG (pseudorandom number generator) before using it for key generation, signing, or random number generation. On the Android Developers Blog, Alex Klyubin, Android Security Engineer, stated that “We have now determined […]

Read MoreMore Tag

CyaSSL and SEP 2.0

Hi!  If you are interested in IoT and specifically security of IoT, then you’ll probably like this article on SEP 2.0.  SEP stands for Smart Energy Profile.  This note is just to let our users know that we’re following the evolution of the standard as it relates to SSL/TLS, and have provided our CyaSSL embedded […]

Read MoreMore Tag

Kyle Wilhoit`s Industrial Control Honeypots presentation from Black Hat

One of the consistent themes at Black Hat is attacks on industrial control systems; which includes water plants, power plants, and oil refineries.  One of the presentations was centered around using honeypots to determine the level of attack activity.  An excellent article on the presentation and related material can be found here:  http://gcn.com/Articles/2013/08/07/ics-honeypots.aspx?s=security_080813&admgarea=TC_SecCybersSec&Page=1 Some of […]

Read MoreMore Tag

Posts navigation

1 2 3 186 187 188 189 190 191 192 216 217 218

Weekly updates

Archives