Top IT Security Bloggers

Anatomy of a cryptographic oracle - understanding (and mitigating) the BREACH attack

A whole lot has been talked, over the past week, about BREACH, a newly-documented attack against HTTPS.

Paul Ducklin digs into the theory, shows how it works in practice, and suggests how to soften the blow...

Read the full article