The State of VPN in China – Apple Pulls VPN Apps From China App Store

Finjan TeamBlog, Cybersecurity

Finjan The State of VPN in China   Apple Pulls VPN Apps From China App Store

To bypass censorship rules and other restrictions placed on internet usage, citizens must resort to Virtual Private Network or VPN applications and services in certain countries. Prominent among these nations is the People’s Republic of China, which not only has a long-standing history of online censorship but also an ongoing policy of proactive intervention when new avenues or technologies emerge … Read More

The Origins of Kerckhoff’s Principle and How it is Used in Encryption Today

Finjan TeamBlog, Cybersecurity

Finjan The Origins of Kerckhoffs Principle and How it is Used in Encryption Today

In this era of disclosure, transparency, and the public internet, maintaining exclusive rights or control over knowledge and techniques is a virtual impossibility. Any measures put in place to safeguard the transfer and storage of information have to contend not only with external threats, but also with the intervention of higher authorities (as in the case of investigations by government … Read More

What is Link Layer Encryption?

Finjan TeamBlog, Cybersecurity

Finjan What is Link Layer Encryption?

Network security is frequently implemented by considering the network as a series of layers, each dedicated to a particular function (data transport, applications, user interactions, etc.). This model has the underlying logic that, with several layers to have to work against, any potential attacker won’t find it easy to break through to the heart or kernel of the system, where … Read More

Shift Row Transformation and Other Examples of Advanced Encryption

Finjan TeamBlog, Cybersecurity

Finjan Shift Row Transformation and Other Examples of Advanced Encryption

These days, we’re often warned about the dangers of hacking and data theft, or reminded of the need to protect our vital documents, sensitive information, and credentials by encryption, when they’re transmitted over the internet or an unprotected network. But what does that mean, exactly? Well, in simple terms, encryption is the process of taking a recognizable item (such as … Read More

Birthday Paradox – When Mathematical Theory is Used in Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Birthday Paradox   When Mathematical Theory is Used in Cyber Attacks

Mathematical permutations and statistical probabilities frequently pose a problem for befuddled high school students, struggling to cope with repetitive calculations and weird symbols. This often occurs because, behind the figures, there’s an underlying logic (which often seems to be anything but logical) that makes what appears on the surface to be an obvious situation or conclusion actually seem anything but. … Read More

Digital Signatures and Information Security

Finjan TeamBlog, Cybersecurity

Finjan Digital Signatures and Information Security

As online and electronic transactions gain as much or more validity than traditional paper-based ones, there’s an increasing need to ensure the authenticity and integrity of the various parties involved, the data and assets traded between them, and the overall security of the transaction process. One method used to accomplish this is the use of digital signatures. What Are Digital … Read More

9 Common Hacking Techniques and How to Deal With Them

Finjan TeamBlog, Cybersecurity

Finjan 9 Common Hacking Techniques and How to Deal With Them

With high-value targets like user credentials, email accounts, and credit card details being stored on personal devices and transmitted freely over the internet, attempts to gain access to these prizes continue at an astonishing pace. Hacking – looking to gain unauthorized access to information by modifying the features of a system or network, or exploiting its vulnerabilities – is one … Read More

The Rijndael Encryption Algorithm

Finjan TeamBlog, Cybersecurity

Finjan The Rijndael Encryption Algorithm

As the Data Encryption Standard (DES) began to show signs of weakness after several years of use, and in the wake of a security crisis surrounding its Triple DES (3DES) variant, the U.S. National Institute of Standards and Technology (NIST) threw a challenge to cryptographers to develop a more resilient platform for the encryption of mission-critical data. What emerged above … Read More

Hashing Algorithms – A Closer Look at the Methods and Applications for Encryption

Finjan TeamBlog, Cybersecurity

Finjan Hashing Algorithms   A Closer Look at the Methods and Applications for Encryption

The same class of mathematical techniques used in databases to index or retrieve items may be employed in cryptography, for the encryption of messages and data. These “hashing algorithms” take a number of forms, and for encryption purposes, they cover a range of strengths and weaknesses. We’ll begin by dealing with some terminology. What is Hashing? As the name loosely … Read More