Posts made in May, 2015

Practical Steps to Counter the Logjam Attack

Posted by on May 26, 2015 in Blog | 1 comment

Another flaw has been found in the basic encryption algorithms that secure the Internet. This flaw, named the Logjam attack by its discoverers (researchers from various universities and companies), allows an attacker that can carry out man-in-the-middle (MitM) attacks to weaken the encryption used in secure connections (such as HTTPS, SSH, and VPNs). In theory, this means that an attacker (with sufficient resources) can break the encryption and read the “secure” traffic. In some ways, this attack is a subset of the recent FREAK attack. Both attacks were made possible by support for...

Read More