How to Prevent Phishing Attacks – 9 Helpful Tips to Avoid Caught

Finjan TeamBlog, Cybersecurity

Finjan How to Prevent Phishing Attacks   9 Helpful Tips to Avoid Caught

In this article, we will look at examples and advice on how to prevent phishing attacks. In digital terms, the practice of phishing – using threatening or enticing messages to compel a recipient to rashly give out personal or financial data, or to blindly rush to a booby-trapped website – is almost as old as the riverbank activity that its … Read More

IoT and Terrorism – Is Innovation Outpacing Security Awareness?

Finjan TeamBlog, Cybersecurity

Finjan IoT and Terrorism   Is Innovation Outpacing Security Awareness?

The operational and commercial opportunities offered by the Internet of Things (IoT) is resulting in the proliferation of consumer, government, and institutional devices which are internet-enabled, often inter-connected, and independently “intelligent”, to the extent that they may be observant, communicative, self-monitoring, and self-regulating. IoT and Terrorism – some interesting facts: Current estimates point to the active deployment of over six … Read More

Common Sneak Attacks Used By Sophisticated Hackers

Finjan TeamBlog, Cybersecurity

Finjan Common Sneak Attacks Used By Sophisticated Hackers

Even though malicious actors continue to score successes by using time-honored cyber-attack techniques preying on the greed, ignorance, poor judgment, or lack of virtual “street smarts” of unsuspecting users, recent years have seen an evolution in hacker methodology. Sophisticated technologies and frankly ingenious uses of simple ideas are empowering a new breed of hacker, and new strains of malware. In … Read More

Top 5 Emerging Security Technologies

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Emerging Security Technologies

Like computing itself, the information security or InfoSec landscape is continuously evolving. What was once the cyber-threat or threat remedy of the month can give way to alternatives, as new techniques and technologies are pioneered by cyber-criminals or InfoSec professionals, alike. As 2017 moves into its second quarter, we’ll be looking at five of the emerging security technologies that are … Read More

9 Common Hacking Techniques and How to Deal With Them

Finjan TeamBlog, Cybersecurity

Finjan 9 Common Hacking Techniques and How to Deal With Them

With high-value targets like user credentials, email accounts, and credit card details being stored on personal devices and transmitted freely over the internet, attempts to gain access to these prizes continue at an astonishing pace. Hacking – looking to gain unauthorized access to information by modifying the features of a system or network, or exploiting its vulnerabilities – is one … Read More

Encapsulating Security Protocol (ESP)

Finjan TeamBlog, data security

Finjan Encapsulating Security Protocol (ESP)

Messages, documents, and files sent via the internet are transmitted in the form of data packets using one or more transfer mechanisms or protocols such as TCP/IP. But how can we ensure that the information received is the authentic material which the originator of the message claims to have sent? That its confidentiality has been preserved along the way? And … Read More

What is Non-Repudiation? A Closer Look at the Principles, Techniques and Best Practices

Finjan TeamBlog, data security

Finjan What is Non Repudiation? A Closer Look at the Principles, Techniques and Best Practices

The “He said, She said” dilemma – where one person claims a certain version of events that’s in partial or complete opposition to the story maintained by another – has been part of human interaction pretty much since the dawn of communication itself. Disputes of this kind are typically resolved through a majority show of faith in one of the … Read More

MAC (Media Access Control)

Finjan TeamBlog, Network Security

Finjan MAC (Media Access Control)

Telecommunications and old-school postal systems use a hierarchy of identifying characteristics (number, exchange, zip or area code, state or country code, etc.) to break the process of transmitting messages into manageable steps, each of which may be handled by mechanisms appropriate to a given stage (mailbox, local sorting office, etc.). The same holds true for network and internet communications, where … Read More

The Rijndael Encryption Algorithm

Finjan TeamBlog, Cybersecurity

Finjan The Rijndael Encryption Algorithm

As the Data Encryption Standard (DES) began to show signs of weakness after several years of use, and in the wake of a security crisis surrounding its Triple DES (3DES) variant, the U.S. National Institute of Standards and Technology (NIST) threw a challenge to cryptographers to develop a more resilient platform for the encryption of mission-critical data. What emerged above … Read More

A Closer Look at the Authentication Header and its Role in Data Transmission and Integrity

Finjan TeamBlog, data security

Finjan A Closer Look at the Authentication Header and its Role in Data Transmission and Integrity

Given that one of the preferred methods for spies and cyber-attackers is to intercept a data stream as it moves from its source to its destination, information security practitioners have to focus much of their effort on ensuring the integrity of data in transit. The Authentication Header is an important part of this. What is an Authentication Header? An Authentication … Read More