Profile cover photo
Profile photo
wolfSSL
15 followers -
Embedded SSL for Applications, Devices, and the Cloud
Embedded SSL for Applications, Devices, and the Cloud

15 followers
About
Posts

Post has attachment
Public
Add a comment...

Post has attachment
Public
Add a comment...

Post has attachment
Public
Add a comment...

Post has attachment
Public
Add a comment...

Post has attachment
Public
Add a comment...

Post has attachment
Public
Add a comment...

Post has attachment
wolfSSL at FOSDEM 2016 - In a matter of weeks, hundreds of Open Source developers will gather in Brussels, Belgium for FOSDEM 2016. FOSDEM is a two day event organized by volunteers to promote the widespread use of Open Source software, and is considered by many to be the best open source conference in Europe [1]. wolfSSL will be attending FOSDEM this year, will have a stand in the “H” building, and will be giving a talk on Testing Cryptography in the security devroom. The wolfSSL stand wil...
Add a comment...

Post has attachment
wolfSSL Safe from SLOTH Attack - A new year, another attack on TLS.  Karthikeyan Bhargavan and Gaetan Leurent of INRIA recently announced the new attack.  TLS 1.2 allows negotiation of the hashing algorithm used for signatures, typically to “upgrade” the hash to a higher security level.  Before TLS 1.2 a combination of MD5 and SHA1 were used for signatures. TLS 1.2 allows SHA1, SHA-256, SHA-384, SHA-512, but also MD5 to be chosen for signatures.  Fortunately for users of the wolfSSL embedde...
Add a comment...

Post has attachment
CES Big Story #3: Internet of Things Hyper Mania Hits Hard Reality - Security
Add a comment...

Post has attachment
IoT Security: Start with the Fundamentals - Securing connected devices, including the IoT, is very important to us at wolfSSL. Larry Stefonic, CEO and Co-Founder of wolfSSL, recently published a guest post on the Xively blog that talks about the fundamentals of device security. This post includes commentary on securing the connection, device authentication, secure firmware updates, and securing the data on the device. To read the article in full, visit the link below: https://blog.xively.co...
Add a comment...
Wait while more posts are being loaded