
RSA weak keys flaw restricted to network devices
However these weak keys were almost in every way restricted to embedded devices: "firewalls, routers, VPN devices, remote server administration devices, printers, projectors, and VoIP (Voice over Internet Protocol) phones" from over 30 manufacturers.
"Cryptographic algorithms are nearly never the root cause of security problems - for the moment those that are not 'in the basement' proprietary algorithms," said Terence Spies, CTO of Voltage Security. "Correct implementation of any security innovation is crucial, and has proven to be quite difficult."
Based on candid 'warts and all' feedback from over a thousand experienced adopters, we take a practical look at the use of desktop Linux in a real world business context.
More information: Theregister.co
More news:
- · Rackspace debuts OpenStack cloud servers
- · America's broadband adoption challenges
- · EPAM Systems Leverages the Cloud to Enhance Its Global Delivery Model With Nimbula Director
- · Telcom & Data intros emergency VOIP phones
- · Lorton Data Announces Partnership with Krengeltech Through A-Qua⢠Integration into DocuMailer
