A new, high-profile encryption vulnerability was discovered in late May. Logjam involves a man-in-the-middle attack that could be implemented to weaken encryption between clients and servers. Because this vulnerability targets legacy encryption standards LogJam shares many qualities with FREAK.
Why are attackers targeting encryption standards?
Listen to this latest Security Slice podcast and hear Tyler Reguly and Tim Erlin discuss how Logjam works, which steps organizations should take to upgrade their encryption standards, and why consumers should configure their web-browsers to protect their data.
CLICK HERE TO LISTEN TO THE PODCAST
- Security Slice: To Notify or Not to Notify
- Security Slice: High Risk Healthcare
- Security Slice: Monitoring the Monitors
- Security Slice: The CAPTCHA Arms Race