Articles about Logjam Attack (23.5.2015)

4 views
Skip to first unread message

Eyal Estrin

unread,
May 23, 2015, 8:10:18 AM5/23/15
to

Logjam Vulnerability: 5 Key Issues
http://www.bankinfosecurity.com/logjam-vulnerability-5-key-issues-a-8249/op-1

LogJam: Researchers Identify Another Web Encryption Vulnerability
http://www.tripwire.com/state-of-security/vulnerability-management/logjam-researchers-identify-another-web-encryption-vulnerability/#.VVxP1X9djqY.linkedin

LogJam Exposed: 575 Cloud Services Potentially Vulnerable to Man-in-the Middle Attacks
https://www.skyhighnetworks.com/cloud-security-blog/logjam-exposed-575-cloud-services-potentially-vulnerable-to-man-in-the-middle-attacks/

How to Check for Logjam Using Nmap
https://danielmiessler.com/blog/check-logjam-nmap/

Logjam, FREAK and Upcoming Changes in OpenSSL
https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/

Logjam crypto attack proves yet again one bad apple spoils the bunch
https://www.bluecoat.com/2015-05-22/logjam-crpyto-attack-proofs-yet-again-one-bad-apple-spoils-bunch

Check Point Threat Alert: Logjam
http://blog.checkpoint.com/2015/05/20/check-point-threat-alert-logjam/

Logjam: the latest TLS vulnerability explained
https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/

The Logjam Attack – ANOTHER Critical TLS Weakness
http://www.darknet.org.uk/2015/05/the-logjam-attack-another-critical-tls-weakness/

What You Need to Know About the Logjam Vulnerability
http://h30499.www3.hp.com/t5/Fortify-Application-Security/What-You-Need-to-Know-About-the-Logjam-Vulnerability/ba-p/6747109#.VWA7qkZjiSo

The Logjam Attack: What You Need to Know
https://blog.malwarebytes.org/security-threat/2015/05/the-logjam-attack-what-you-need-to-know/

Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it
https://nakedsecurity.sophos.com/2015/05/21/anatomy-of-a-logjam-another-tls-vulnerability-and-what-to-do-about-it/

LogJam Vulnerability Threatens Thousands of HTTPS Websites & Mail Servers
http://blog.avira.com/logjam-vulnerability-threatens-thousands-of-https-websites-mail-servers/

Breaking down the Logjam (vulnerability)
https://community.rapid7.com/Rapid7_BlogPostDetail?id=a111400000Ab1hWAAR

LogJam, Little Sister of FREAK
http://blog.sensecy.com/2015/05/21/logjam-little-sister-of-freak/

Logjam is latest security flaw to affect secure communication protocols
http://www.symantec.com/connect/blogs/logjam-latest-security-flaw-affect-secure-communication-protocols

Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers
http://securityintelligence.com/news/logjam-flaw-may-open-data-to-cybercriminals-by-fooling-web-browsers/#.VWBpTkZjiSo

More SSL Mess - Logjam
http://community.websense.com/blogs/securitylabs/archive/2015/05/21/more-ssl-mess-logjam.aspx

Logjam security flaw leaves top HTTPS websites, mail servers vulnerable
http://www.zdnet.com/article/logjam-security-flaw-leaves-tens-of-thousands-of-https-websites-vulnerable/

Enterprise, cloud services exposed as vulnerable to Logjam
http://www.zdnet.com/article/enterprise-cloud-services-exposed-as-vulnerable-to-logjam/

Reply all
Reply to author
Forward
0 new messages