Get a Pentest and security assessment of your IT network.

Cyber Security

Understanding IPSec

This quick tutorial gives you a foundation for understanding the IPSec protocol and how it can be used to secure some online sessions. The attack targets IKE s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions. Mike Mimoso and Chris Brook discuss the news of the week: The latest Xen vulnerability, CISA passing the Senate, a researcher challenging that Weak DH paper, and more.

Source: https://threatpost.com/understanding-ipsec-040809/72529/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security