Princeton Team Cracks Popular Disk Encryption Software

A team of researchers primarily from Princeton released Thursday, Feb. 21st, vulnerabilities in many full-disk encryption software packages that could allow attackers to gain access to the encryption key from RAM.  In most cases, the system would have to be compromised while on, or in "suspend" or "hibernate" mode; however, some exceptions exist.  To read the full research paper, watch the video, or review frequently asked questions go to http://citp.princeton.edu/memory/

Security and Compliance Encryption