![]() ![]() Implementing an encryption algorithm is only a part of a security implementation. However, it is not a guarantee that a product is secure. "FIPS 140-2 security validation is a useful tool in assessing the security of encryption products. Dan Boneh, a leading authority in the fields of cryptography and computer science, and professor of computer science at Stanford University in applied cryptography and computer security. "This security flaw means that data on the affected products is at risk of disclosure," said Dr. Security analysts were able to write a simple unlocker tool patching the software and unlocking any of those devices instantaneously without the user's password. It is equivalent to a single shared backdoor password for all of these devices. This is an inherent design error, and is not secure. In short, the products use software that runs on the host PC to verify the correctness of a user's password. ![]() The vulnerability is a major flaw in the design of the affected products. Reports detailing the vulnerabilities, and how to hack these devices, have been published by German security firm SySS. To view the multimedia assets associated with this release, please click ![]() 4, IronKey, maker of the world's most secure flash drive, today announced that its devices are not vulnerable to the serious architectural flaw that has compromised many 'secure' USB storage devices. 7 /PRNewswire/ - In response to the reports that certain hardware-encrypted USB flash drives have been hacked on Monday, Jan. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |