Company Updates & Technology ArticlesTry Auth0 for Free Contact Us
Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs
Cracking a JWT signed with weak keys is possible via brute force attacks. Learn how Auth0 protects against such attacks and alternative JWT signing methods provided.
Critical Vulnerability in JSON Web Encryption
JSON Web Encryption is vulnerable to a classic Invalid Curve Attack. Learn how this may affect you and what to do about it.
Building and Securing Koa and Angular 2 with JWT
Single Page Applications (SPAs) can benefit greatly from JWT secured backends. Here we will see how to secure an Angular 2 app, backed by Koa, with JWTs.