Birthday Paradox – When Mathematical Theory is Used in Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Birthday Paradox   When Mathematical Theory is Used in Cyber Attacks

Mathematical permutations and statistical probabilities frequently pose a problem for befuddled high school students, struggling to cope with repetitive calculations and weird symbols. This often occurs because, behind the figures, there’s an underlying logic (which often seems to be anything but logical) that makes what appears on the surface to be an obvious situation or conclusion actually seem anything but. … Read More

Digital Signatures and Information Security

Finjan TeamBlog, Cybersecurity

Finjan Digital Signatures and Information Security

As online and electronic transactions gain as much or more validity than traditional paper-based ones, there’s an increasing need to ensure the authenticity and integrity of the various parties involved, the data and assets traded between them, and the overall security of the transaction process. One method used to accomplish this is the use of digital signatures. What Are Digital … Read More

9 Common Hacking Techniques and How to Deal With Them

Finjan TeamBlog, Cybersecurity

Finjan 9 Common Hacking Techniques and How to Deal With Them

With high-value targets like user credentials, email accounts, and credit card details being stored on personal devices and transmitted freely over the internet, attempts to gain access to these prizes continue at an astonishing pace. Hacking – looking to gain unauthorized access to information by modifying the features of a system or network, or exploiting its vulnerabilities – is one … Read More

The Rijndael Encryption Algorithm

Finjan TeamBlog, Cybersecurity

Finjan The Rijndael Encryption Algorithm

As the Data Encryption Standard (DES) began to show signs of weakness after several years of use, and in the wake of a security crisis surrounding its Triple DES (3DES) variant, the U.S. National Institute of Standards and Technology (NIST) threw a challenge to cryptographers to develop a more resilient platform for the encryption of mission-critical data. What emerged above … Read More

Hashing Algorithms – A Closer Look at the Methods and Applications for Encryption

Finjan TeamBlog, Cybersecurity

Finjan Hashing Algorithms   A Closer Look at the Methods and Applications for Encryption

The same class of mathematical techniques used in databases to index or retrieve items may be employed in cryptography, for the encryption of messages and data. These “hashing algorithms” take a number of forms, and for encryption purposes, they cover a range of strengths and weaknesses. We’ll begin by dealing with some terminology. What is Hashing? As the name loosely … Read More

Substitution Ciphers – A Look at the Origins and Applications of Cryptography

Finjan TeamBlog, Cybersecurity

Finjan Substitution Ciphers   A Look at the Origins and Applications of Cryptography

We may have gotten used to thinking of encryption as a modern-day digital phenomenon. But humans have been sending coded transmissions in one form or another, pretty much since language was invented. One of the most widely used forms of early cryptography was the substitution cipher. What are Substitution Ciphers? A substitution cipher is a method of cryptography (the science … Read More

Smart Card Attacks – A Look at How Hardware Tokens are Being Exploited

Finjan TeamBlog, Cybersecurity

Finjan Smart Card Attacks   A Look at How Hardware Tokens are Being Exploited

With their embedded microchip technology and the secure authentication they can provide, smart cards or hardware tokens have been relied upon to give physical access and the go-ahead for data transfer in a multitude of applications and transactions, in the public, corporate, and government sectors. But, robust as they are, smart cards do have weaknesses – and intelligent hackers have … Read More

Symmetric Versus Asymmetric Encryption

Finjan TeamBlog, Cybersecurity

Finjan Symmetric Versus Asymmetric Encryption

In the face of threats like data tampering, snooping, and identity theft, individuals and organizations require some means to ensure the safety of information that’s transmitted through private networks and over public channels. Encryption is one way of achieving this. On the surface, it sounds like a simple process: Take a message or document, scramble it, send it, and provide … Read More