REDWOOD SHORES, Calif., March 26, 2015 (GLOBE NEWSWIRE) -- Imperva, Inc. (NYSE:IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today released its latest Hacker Intelligence Initiative (HII) report, "Attacking SSL when using RC4: Breaking SSL with a 13-year old RC4 Weakness." Authored by the company's Application Defense Center (ADC) research team, the report reveals new attack vulnerabilities on the popular Transport Layer Security (TLS/SSL) protocol, which is currently used to protect as many as 30 percent of all SSL transactions, a number that may equate up to billions of TLS connections per day.
The Reach of This Threat
SSL, believed to be the most widely-used secure communications protocol on the Internet today, is used for securing a wide variety of application-level traffic. Serving as the basis of the HTTPS protocol for securing web browsing, it is used in conjunction with IMAP or SMTP to cryptographically protect email traffic, as well as being a popular tool to secure communication with embedded systems, mobile devices, and in payment systems.
Considering the popularity of SSL in Internet connections, it would only make sense that this protocol is completely secure. However, in the last few years, several significant vulnerabilities have been discovered in the SSL protocol. The Imperva research team has discovered that using the RC4 algorithm, known to be a weak cipher for many years, is putting users' sensitive data at risk.
Report Examines Several Attack Specifics:
"The research team that comprises the Application Defense Center is continually updating existing work, exploring new vulnerabilities and publishing reports that provide insight and guidance on the latest threats," said Itsik Mantin, director of security research, Imperva. "This latest research on the vulnerabilities affecting up to billions of TLS connections every day, is just another example of how we're helping to alert users of online threats, while providing actionable guidance on how security professionals can protect their organization from the latest threats."
How to Protect Against an Attack
From this latest research published by the ADC, Imperva encourages web administrators to disable RC4 in their SSL configuration; web users to disable RC4 in their browser SSL configuration; and browser providers to remove RC4 from their SSL cipher list.
For a full copy of the Imperva report "Attacking SSL when using RC4: Breaking SSL with a 13-year old RC4 Weakness," please visit http://www.imperva.com/download.asp?id=489.
About Imperva
Imperva® (NYSE:IMPV), is a leading provider of cyber security solutions that protect business-critical data and applications. The company's SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives - in the cloud and on-premises - and comply with regulations. The Imperva Application Defense Center, a research team comprised of some of the world's leading experts in data and application security, continually enhances Imperva products with up-to-the minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.
© 2015 Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are trademarks of Imperva, Inc. and its subsidiaries.