Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw

The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions. Continue reading Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw

Encryption 101: Decryptor’s thought process

In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live example of a ransomware in detail, and talked about encryption weaknesses. In this part of the encryption 101 series, we will begin wrappin… Continue reading Encryption 101: Decryptor’s thought process

Encryption 101: How to break encryption

Continuing on in our Encryption 101 series, we now look at what it takes to break encryption. In order for something as powerful as encryption to break, there needs to be some kind of weakness to exploit. That weakness is often a result of an erro… Continue reading Encryption 101: How to break encryption