Etiquetas » Freak

Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it

Logjam courtesy of Shutterstock

Transaction security on the internet is where you can find the funkiest vulnerability names.

They include BEAST, Lucky Thirteen… 1.710 palabras más

Featured

Eating Problems?!

Is it normal to feel the food you eat go down your throat?

Like from the start to end, you can feel the food you’ve just chewed slowly being pushed down your throat against the wall of your throat. 260 palabras más

LogJam, Little Sister of FREAK

On May 20, 2015, researchers from the University of Michigan announced a new vulnerability in the Diffie-Hellman key exchange, called LogJam.

The vulnerability resides in the basic design of TLS itself, exposing both clients and servers, including mail servers, to a MitM attack, in which a malicious attacker can downgrade SSL-based connections to 512-bit export-grade cryptography, thus bypassing the basic security mechanism and allowing the attacker to read and modify any exposed traffic. 419 palabras más

Cyber Intelligence

Like FREAK before it, Logjam shows why governments shouldn't undermine encryption

A newly-disclosed vulnerability undermines several common security protocols and leaves information sent over many connections vulnerable to surveillance. It’s called the Logjam bug, and it could affect thousands of sites and services. 447 palabras más

Tech

Organizations remind Obama that government 'backdoors' are a terrible idea

A group of tech companies have written a letter to President Obama urging him not to approve legislation requiring them to add “backdoors” to their products. 404 palabras más

Tech

Lies of the Beautiful People by Sixx; A.M.

Keeping with the freak theme, here is the next installment. Real beauty is never on the outside but can be found deep within the soul.

Music