Can You Capture the Flag?
June 04, 2015 | POSTED BY RYAN MCCARTHY IN UNCATEGORIZED
In the cyber-security realm, arguably one of the best methods of gaining hands-on experience is to compete in Capture the Flag (CTF) competitions. Since they are designed, hosted, and competed in by leading whitehats and blackhats, the challenges and the ...READ MORE +
POODLE Attack on SSL 3.0
May 28, 2015 | POSTED BY STEVEN ANDERSON IN ENCRYPTION
The POODLE attack or "Padding Oracle On Downgraded Legacy Encryption" is a fairly recent attack that takes advantage of both the backwards compatibility integrated into SSL/TLS protocols and the means by which SSL/TLS protocols are negotiated. Its purpose...READ MORE +
May 21, 2015 | POSTED BY STEVEN ANDERSON IN SECURITY, MONITORING, SIEM
The TLS protocol is the current standard for secure communication over the Internet and until now had been considered to be highly secure. A recent discovery of Logjam, a vulnerability that spawns results similar to that of FREAK (Factoring Attack on RSA-...READ MORE +