Following the news that a new security flaw dubbed the ‘Logjam’ attack is leaving tens of thousands of websites and mail servers are vulnerable to hackers, please find below a quote from Ken Simpson, CEO at Mail Channels.

“Organizations cannot afford to rest on their laurels when it comes to cyber security. Hackers are constantly seeking to exploit vulnerabilities; Heartbleed, FREAK and now LogJam all take advantage of cyber security complacency. The LogJam attack on common implementations of Diffie-Hellman is an extreme threat to security and privacy. In all likelihood, nation state actors are already using this attack to snoop encrypted VPN, email and web connections. Companies need to ensure they constantly examine their own digital defences keeping security software up-to-date and as this attack highlights, patching flaws before hackers take advantage.”

By Ken Simpson, CEO MailChannels

Ken SimpsonBio : Ken Simpson, founder and CEO of MailChannels Corporation. Ken first experienced the excitement and magic of software when his father brought home one of the first IBM PCs in 1980, teaching him how to write simple programs in BASIC. Since then, he has combined his passion for software with entrepreneurism, founding or participating as an early-stage employee in four successful startups in a broad range of technical areas including Voice-over-IP, Wireless Internet, and of course anti-spam. Ken has a First Class Honors degree in Computer Engineering from Simon Fraser University and Santa Clara University. At the Messaging Anti-Abuse Working Group (MAAWG), Ken splits his time running the botnet and web abuse sub-committees, as well as assisting in the work of the outbound abuse sub-committee.

ISBuzz Staff
Expert Comments : 1
Security Articles : 12413

ISBuzz staff provides a brief synopsis and summary of the breaking information security news and topics to allow information security experts to provide their expert commentary on the breaking news or the topics.
Notify of

0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
Would love your thoughts, please comment.x