This document summarizes research on breaking encryption schemes that use the RC4 stream cipher. The researchers discovered new biases in the RC4 keystream that allow recovering plaintext more efficiently. They applied these biases to break WPA-TKIP encryption and decrypt HTTPS cookies. For WPA-TKIP, simulating traffic captures allowed decrypting packets and the message integrity check key within an hour. For HTTPS, biases were combined to decrypt 16-character cookies in around 75 hours by manipulating requests sent to a target site. The work significantly advances attacks against protocols still relying on the weakened RC4 cipher.