TLS 1.3 – How Will It Impact Secure Web Communications?

Finjan TeamBlog, Cybersecurity

Finjan TLS 1.3   How Will It Impact Secure Web Communications?

Building on the legacy of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption protocols, the recently ratified TLS 1. 3 looks to set a new standard for secure web communications and online application deployment. As we’ll see, improvements in security aren’t all that TLS 1. 3 has to offer. But there are technical considerations which are likely … Read More

What is WireGuard? A Closer Look at a New VPN Technology

Finjan TeamBlog, Cybersecurity

Finjan What is WireGuard? A Closer Look at a New VPN Technology

A new VPN (Virtual Private Network) technology called WireGuard that’s being billed as perhaps “the most secure, easiest to use, and simplest VPN solution in the industry” is currently gaining traction. It’s especially popular among application developers working for companies that are looking to build their backend infrastructure (administration, archives, and other non-customer facing business units or applications) on the … Read More

The Growing Use of Blockchain Technology in Cars

Finjan TeamBlog, Cybersecurity

Finjan The Growing Use of Blockchain Technology in Cars

With the evolution of the automobile beyond four (sometimes three) wheels, a solid chassis, and an internal combustion engine, vehicular technology has had to embrace a full spectrum of innovations, as the market continues to develop and grow. New materials, alternative fuel, and energy sources, changing manufacturing and safety standards, and the incorporation of computer technology throughout: All of these … Read More

Hardware Encryption – How is the Market Emerging?

Finjan TeamBlog, Cybersecurity

Finjan Hardware Encryption – How is the Market Emerging?

Privacy and information security concerns have fueled the increased usage in recent years of data encryption. Much of the focus of this activity – and most of the forms in which the related technology has been distributed and implemented – has been on desktop software, mobile applications, and network/system processes. But hardware-based encryption methods and technologies do exist – and … Read More

The State of VPN in China – Apple Pulls VPN Apps From China App Store

Finjan TeamBlog, Cybersecurity

Finjan The State of VPN in China   Apple Pulls VPN Apps From China App Store

To bypass censorship rules and other restrictions placed on internet usage, citizens must resort to Virtual Private Network or VPN applications and services in certain countries. Prominent among these nations is the People’s Republic of China, which not only has a long-standing history of online censorship but also an ongoing policy of proactive intervention when new avenues or technologies emerge … Read More

The Origins of Kerckhoff’s Principle and How it is Used in Encryption Today

Finjan TeamBlog, Cybersecurity

Finjan The Origins of Kerckhoffs Principle and How it is Used in Encryption Today

In this era of disclosure, transparency, and the public internet, maintaining exclusive rights or control over knowledge and techniques is a virtual impossibility. Any measures put in place to safeguard the transfer and storage of information have to contend not only with external threats, but also with the intervention of higher authorities (as in the case of investigations by government … Read More

What is Link Layer Encryption?

Finjan TeamBlog, Cybersecurity

Finjan What is Link Layer Encryption?

Network security is frequently implemented by considering the network as a series of layers, each dedicated to a particular function (data transport, applications, user interactions, etc.). This model has the underlying logic that, with several layers to have to work against, any potential attacker won’t find it easy to break through to the heart or kernel of the system, where … Read More

Shift Row Transformation and Other Examples of Advanced Encryption

Finjan TeamBlog, Cybersecurity

Finjan Shift Row Transformation and Other Examples of Advanced Encryption

These days, we’re often warned about the dangers of hacking and data theft, or reminded of the need to protect our vital documents, sensitive information, and credentials by encryption, when they’re transmitted over the internet or an unprotected network. But what does that mean, exactly? Well, in simple terms, encryption is the process of taking a recognizable item (such as … Read More

Birthday Paradox – When Mathematical Theory is Used in Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Birthday Paradox   When Mathematical Theory is Used in Cyber Attacks

Mathematical permutations and statistical probabilities frequently pose a problem for befuddled high school students, struggling to cope with repetitive calculations and weird symbols. This often occurs because, behind the figures, there’s an underlying logic (which often seems to be anything but logical) that makes what appears on the surface to be an obvious situation or conclusion actually seem anything but. … Read More