RSA Security has asked developers to stop using the Dual EC DRBG encryption algorithm in products. Experts are concerned why RSA used a possibly compromised algorithm in the first place. Dual ECDRBG was backed by the National Security Agency, which initially proposed the algorithm as a standard. The algorithm is the default pseudo random number generator in a number of RSA products, including the RSA BSAFE libraries and RSA s key management product RSA Data Protection Manager. It was one of four approved random bit generators in NIST Special Publication 800-90, but it sticks out like a sore thumb.
Source: https://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect/102377/