Relevant Items
Refine Search expand_more
Blog add
2 Results for 'DROWN'

PROVE IT: Why do Malicious Cyber-attacks Have Cute Names?

“Heartbleed Bug”. “Poodle”. “Sea-Surf”. “DROWN”. If these were super villain names, I wouldn’t exactly be sending in Superman to deal with these guys. But, don’t let these catchy names fool you - these are the names of serious cyber-attacks that resulted in millions of people’s data being exposed and financial information compromised. 

SSL 2.0 and DROWN

A team of researchers has announced a vulnerability with SSL 2.0 called Decrypting RSA with Obsolete and Weakened eNcryption; otherwise known as DROWN. SSL 2.0 is a version of the SSL/TLS security protocols.
Page 1 of 1