Search Results for: freak

LogJam, FREAK’s Ugly Cousin

A new encryption attack, called LogJam, has emerged that allows attackers to read and modify the sensitive data passing through encrypted connections, potentially affecting hundreds of thousands of HTTPS-protected sites, mail servers, and other widely used Internet services. A man-in-the-middle … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on LogJam, FREAK’s Ugly Cousin

Windows Vulnerable to FREAK

Microsoft confirms that most production versions of Windows are susceptible to the FREAK vulnerability in schannel (secure channel), where an attacker can force a downgrade in the SSL and then perform a man-in-the-middle attack. I last reported that FREAK only … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on Windows Vulnerable to FREAK

Factoring attack on RSA-EXPORT Keys (FREAK)

Researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered. The ssl3_get_key_exchange function … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Factoring attack on RSA-EXPORT Keys (FREAK)

Pat’s Run 2019

I walked Pat’s Run this year with Tammy and Ron from work. Diana was around the last mile too, but she hates photos and gets mad if you take any pictures of her!  

Posted in life | Tagged , , , | Comments Off on Pat’s Run 2019

Costumes and Cosplay

Jaime and I, even before we started dating, were into dressing up for fun stuff. Over the years, we’ve done so many more costumes together and joined like-minded people who also enjoy costuming and cosplay, not just wearing them, but … Continue reading

Comments Off on Costumes and Cosplay

Ransomware and the IoT

During a security conference, a gentleman demonstrated a thermostat that he compromised, lock out the user for a ransom. He was even able to make the thermostat emit a tone only animals can hear. Imagine your dogs or cats freaking … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Ransomware and the IoT

The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Denial of Service explained: Computers respond to network traffic, generally. If there was a computer on my network that wanted to talk to my computer, that computer would put out a request to talk to my computer over the network, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Uptime Funk You Up!

Here are the lyrics so you can sing along. This bit Uncontrolled A bad bug, Make my system fold This bug, in the kernel My kernel My uptime ceases Freakin’, Spazzin’ My manager’s mad, it ain’t pretty I need caffeine, … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Uptime Funk You Up!

Hawaii 2015

All photos are linked to their full sized pictures. Just click on them to “zoom in”. Alternatively, here are the photos without the story, but in chronological order. Jaime and Carmelo wanted their own little personal, romantic, and fun vacation. … Continue reading

Posted in life | Comments Off on Hawaii 2015

Hypercom of Scottsdale, Arizona’s Equinox Payments

Equinox is working with customers, distributors, and channel partners to replace the certificates to return terminals to an operational state after all payment terminals bricked themselves. Why? Because cryptographic certificates used in the devices has expired en masse. Many merchants … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hypercom of Scottsdale, Arizona’s Equinox Payments