Relevant Items
Filter Blogs expand_more
Blog add
Authors add
2 Results for 'DROWN'
Blog

PROVE IT: Why do Malicious Cyber-attacks Have Cute Names?

By Stephen Demone

October 11, 2016

“Heartbleed Bug”. “Poodle”. “Sea-Surf”. “DROWN”. If these were super villain names, I wouldn’t exactly be sending in Superman to deal with these guys. But, don’t let these catchy names fool you - these are the names of serious cyber-attacks that resulted in millions of people’s data being exposed and financial information compromised. 
Blog

SSL 2.0 and DROWN

By Bruce Morton

March 31, 2016

A team of researchers has announced a vulnerability with SSL 2.0 called Decrypting RSA with Obsolete and Weakened eNcryption; otherwise known as DROWN. SSL 2.0 is a version of the SSL/TLS security protocols.
Page 1 of 1