Encryption weaknesses in RSA certificates leave IoT devices vulnerable to attack

clock
RSA cryptography technique is used to secure data transmission to remote sources
Image:

RSA cryptography technique is used to secure data transmission to remote sources

Researchers find one-in-172 RSA certificates using a common factor to generate keys

Researchers at cyber security firm Keyfactor have identified encryption weaknesses in RSA certificates, leaving millions of Internet of Things (IoT) devices at risk of attack. In their latest study,...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Management

Evolving rapidly doesn't have to mean rip and replace

Digital transformation vs. continuity: how to win IT's biggest battle

Transformation is often at odds with continuity – but it doesn't have to be

Computing Staff
clock 11 January 2022 • 4 min read
You can have your cake and eat it, too

The powerful impact of purposeful acceleration

It is possible to modernise your estate while staying afloat, but it requires a coherent strategy

Computing Staff
clock 06 January 2022 • 4 min read
Jane Deal, IT director, the Law Society

Understanding the post-pandemic operating model: An interview with Jane Deal, IT director, the Law Society

Deal discusses the technologies exciting her at the moment, and which trends she finds most concerning

Stuart Sumner
clock 20 December 2021 • 3 min read