Practical Steps to Counter the Logjam Attack

Posted by on May 26, 2015 1 comment

Another flaw has been found in the basic encryption algorithms that secure the Internet. This flaw, named the Logjam attack by its discoverers (researchers from various universities and companies), allows an attacker that can carry out man-in-the-middle (MitM) attacks to weaken the encryption used in secure connections (such as HTTPS, SSH, and VPNs). In theory, this means that an attacker (with sufficient resources) can break the encryption and read the “secure” traffic. In some ways, this attack is a subset of the recent FREAK attack. Both attacks were made possible by support...

Read More