Earlier this month, Google announced that a security compromise had been found which affects applications that improperly initialize, or fail to initialize completely, the PRNG (pseudorandom number generator) before using it for key generation, signing, or random number generation. On the Android Developers Blog, Alex Klyubin, Android Security Engineer, stated that “We have now determined […]
Read MoreMore TagCategory: Uncategorized
CyaSSL and SEP 2.0
Hi! If you are interested in IoT and specifically security of IoT, then you’ll probably like this article on SEP 2.0. SEP stands for Smart Energy Profile. This note is just to let our users know that we’re following the evolution of the standard as it relates to SSL/TLS, and have provided our CyaSSL embedded […]
Read MoreMore TagUsing CyaSSL with Cavium NITROX Security Processors
CyaSSL now supports the Cavium NITROX processors, thus enabling CyaSSL users to take advantage of the incredible performance boosts provided by the NITROX family. Cavium’s NITROX processors combine cryptographic acceleration with the latest security algorithms. The NITROX PX family can deliver performance ranging from 500 Mbps to 2.5 Gbps for full SSL protocol offload, and […]
Read MoreMore TagFreeRTOS Web Server
Hi! wolfSSL`s Secure Embedded Web Server is now available for FreeRTOS. Let us know if you`re interested at facts@wolfssl.com.
Read MoreMore TagwolfSSL Fan Art by Steve Barker
Here at wolfSSL, we’re always excited to see fan art! Today we’d like to thank Steve Barker (https://plus.google.com/103515628980768116177/posts) for the rendition of our logo and tagline!
Read MoreMore TagKyle Wilhoit`s Industrial Control Honeypots presentation from Black Hat
One of the consistent themes at Black Hat is attacks on industrial control systems; which includes water plants, power plants, and oil refineries. One of the presentations was centered around using honeypots to determine the level of attack activity. An excellent article on the presentation and related material can be found here: http://gcn.com/Articles/2013/08/07/ics-honeypots.aspx?s=security_080813&admgarea=TC_SecCybersSec&Page=1 Some of […]
Read MoreMore TagExcellent SSL Deployment Guide from Qualys SSL Labs
Qualys put out an excellent SSL deployment best practices paper a few months ago. If you have not seen it, then check it out here: https://www.ssllabs.com/projects/best-practices/
Read MoreMore TagSSL and Home Automation
We are at Black Hat 2013 this week and have seen some really cool hacks. Today, we saw “Honey, I`m Home!! Hacking Z-Wave Home Automation Systems” presented by Behrang Fouladi and Sahand Ghanoun. They demonstrated how easy it is to unlock someone`s house with a laptop and a sub-$75 radio card. While you can encrypt […]
Read MoreMore TagNasty New Car Attacks, Automobile Hacks
Carmakers these days are clearly seduced by the power automotive electronics have to help sell their cars. At wolfSSL, we`re seeing more and more connected auto devices getting designed (and secured by CyaSSL) in recent years. All of the carmakers and their suppliers we deal with are quite cognizant of the security risks their connected […]
Read MoreMore TagSSL and Cryptography in Software Defined Networks
Hi! If you follow the networking market, you probably know that Software Defined Networks (SDN) represent a potential tectonic shift in how we think about and design network environments. The concept has been around since 2005, but has gained significant momentum in the last couple of years, to the point where it is not just […]
Read MoreMore Tag
