+1-888-690-2424
  • SSL Review: August 2016

    Entrust Datacard’s monthly SSL review covers SSL/TLS discussions — recaps news, trends and opinions from the industry. Entrust Datacard and CA Security Council Entrust Identity ON discussed: Minimum Requirements for Code Signing Certificates PROVE IT: Can One Certificate Authority Be More Reliable Than Another? HEIST Supports BREACH and CRIME Attacks THREAT ALERT: How a SWEET32 Birthday Attack is Deployed and

        in SSL
    0
  • Trust Indication Change in Google Chrome

    Google is making security icon changes in the Chrome status bar. The changes are based on a research paper prepared by members of Google and University of California, Berkeley. The research evaluated forty icons, seven complementary strings and surveyed 1,329 people. The goal is to make it easier for browser users to determine how secure their connection to a site

        in General, SSL
    0
  • THREAT ALERT: How a SWEET32 Birthday Attack is Deployed and How to Prevent It

    Details surrounding the SWEET32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN can be found in the paper released by Karthikeyan Bhargavan and Gaëtan Leurent from INRIA in France. The paper shows that cipher suites using 64-bit block length ciphers are vulnerable to plaintext recovery attacks. As such, Triple-DES (3DES) and Blowfish are vulnerable. Here’s an overview. VULNERABILITIES

        in Alerts, SSL, SSL Deployment
    0
  • HEIST Supports BREACH and CRIME Attacks

    At Black Hat USA 2016, doctoral candidates Mathy Vanhoef and Tom Van Goethem presented HEIST, an SSL/TLS vulnerability. HEIST is short for “HTTP Encrypted Information can be Stolen through TCP-windows.” The attack can be triggered simply by a JavaScript file, which may be hidden in a web advertisement or hosted directly on a webpage. Malicious code can then query a

        in SSL
    0
  • THREAT ALERT: How a SWEET32 Birthday Attack is Deployed and How to Prevent It

    Details surrounding the SWEET32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN can be found in the paper released by Karthikeyan Bhargavan and Gaëtan Leurent from INRIA in France. The paper shows that cipher suites using 64-bit block length ciphers are vulnerable to plaintext recovery attacks. As such, Triple-DES (3DES) and Blowfish are vulnerable. Here’s an overview. VULNERABILITIES

        in Alerts, SSL, SSL Deployment
    0
  • HEIST Supports BREACH and CRIME Attacks

    At Black Hat USA 2016, doctoral candidates Mathy Vanhoef and Tom Van Goethem presented HEIST, an SSL/TLS vulnerability. HEIST is short for “HTTP Encrypted Information can be Stolen through TCP-windows.” The attack can be triggered simply by a JavaScript file, which may be hidden in a web advertisement or hosted directly on a webpage. Malicious code can then query a

        in SSL
    0
Page 3 of 55««...234...10152025...»»