Email Spoofing – How SPF, DMARC and DKIM Help Detect and Prevent Attacks

Finjan TeamBlog, Cybersecurity

Finjan Email Spoofing   How SPF, DMARC and DKIM Help Detect and Prevent Attacks

As email remains one of the primary communications channels for private individuals, commercial or non-commercial organizations, and government institutions, it’s little wonder that it also continues to be a medium of choice for hackers and cyber-criminals. Two of their preferred attack methods are impersonation and fraud – both of which may be readily accomplished by spoofing the internet domains associated … Read More

KRACK Wi-Fi Vulnerability

Finjan TeamBlog, Cybersecurity

Finjan KRACK Wi Fi Vulnerability

Accepted as the current standard for the secure encryption of Wi-Fi networks, Wi-Fi Protected Access 2 or WPA2 has for some time been the automatic choice for users wishing to set up a wireless access point that’s free from the threat of eavesdroppers. But as with all things in the digital realm, evolving methods and technologies can and do conspire … Read More

Direct Sequence Spread Spectrum

Finjan TeamBlog, Cybersecurity

Finjan Direct Sequence Spread Spectrum

In conventional wireless communications, transmission typically occurs at a set frequency – and if an eavesdropper can determine what that frequency is, then it’s a fairly simple task for them to intercept the data stream, or disrupt it in some way. Military engineers have long understood this principle, and the possibilities it presents for compromising vital missions and operational security. … Read More

IDaaS (Identity as a Service) – A Single Sign-on Service for the Cloud

Finjan TeamBlog, Cybersecurity

Finjan IDaaS (Identity as a Service)   A Single Sign on Service for the Cloud

The technology of the cloud makes it possible to vastly expand the reach and capabilities of individuals and organizations – through its ability to boost computing and storage capacity through the use of multiple remote servers, the potential to combine infrastructure, software, and services, and the power to provide access to potentially global pools of talent, money, and resources. This … Read More

The Origins of Kerckhoff’s Principle and How it is Used in Encryption Today

Finjan TeamBlog, Cybersecurity

Finjan The Origins of Kerckhoffs Principle and How it is Used in Encryption Today

In this era of disclosure, transparency, and the public internet, maintaining exclusive rights or control over knowledge and techniques is a virtual impossibility. Any measures put in place to safeguard the transfer and storage of information have to contend not only with external threats, but also with the intervention of higher authorities (as in the case of investigations by government … Read More

Identity Access Management – How It Is Used to Protect the Enterprise

Finjan TeamBlog, Cybersecurity

Finjan Identity Access Management   How It Is Used to Protect the Enterprise

With advances in technology and the growth of the digital economy, enterprise computer networks have expanded beyond the in-house data center to include wireless and mobile applications and networks, and to embrace the internet at large. Good business practice and the demands of regulatory compliance regimes now oblige commercial organizations to take proper measures to safeguard the security and integrity … Read More

VPN Restrictions in China, Russia and Other Countries

Finjan TeamBlog, Cybersecurity

Finjan VPN Restrictions in China, Russia and Other Countries

Although authorities in Europe have taken a stand on data privacy which comes down firmly on the side of the consumer, internet users in other parts of the world haven’t been so lucky. This has sparked a renewed interest in Virtual Private Network or VPN services and applications, as a hedge against government surveillance, targeted advertising, and the attention of … Read More

Shift Row Transformation and Other Examples of Advanced Encryption

Finjan TeamBlog, Cybersecurity

Finjan Shift Row Transformation and Other Examples of Advanced Encryption

These days, we’re often warned about the dangers of hacking and data theft, or reminded of the need to protect our vital documents, sensitive information, and credentials by encryption, when they’re transmitted over the internet or an unprotected network. But what does that mean, exactly? Well, in simple terms, encryption is the process of taking a recognizable item (such as … Read More

Digital Signatures and Information Security

Finjan TeamBlog, Cybersecurity

Finjan Digital Signatures and Information Security

As online and electronic transactions gain as much or more validity than traditional paper-based ones, there’s an increasing need to ensure the authenticity and integrity of the various parties involved, the data and assets traded between them, and the overall security of the transaction process. One method used to accomplish this is the use of digital signatures. What Are Digital … Read More