According to a new Frost & Sullivan white paper, the number of consumers using digital payment methods continues to increase worldwide—and so do concerns about online fraud. With 6.17 million data records stolen every day by cybercriminals, companies doing business on the internet have two choices: win the digital trust of consumers or lose revenue. […]
The DigiCert Blog
This is the first of a series of technical blogs that DigiCert is publishing on quantum computing and the coming post-quantum transition. Upcoming articles will provide additional, easy to understand information about what is happening and steps that can be taken now to prepare for the future. Bookmark our blog and follow us on Twitter […]
Panasonic Connected Solutions Company builds IoT solutions that connect with people, devices and services. Chief Engineer Saburo Toyonaga and team develop security software for B-to-B IoT devices. They have developed an encryption module that permits incorporation of a certificate at manufacturing, and that runs efficiently even on CPUs with slower speeds or lower specifications. Panasonic […]
Yesterday, a critical vulnerability in Bash was discovered. Today, the bug has already been found 'in the wild' and in use by active exploits against web servers.
Mozilla is following Microsoft's SHA-1 deprecation timeline and adding SHA-1 security warnings to the Firefox Web Console and browser.
This Week in SSL – Firefox Security Update, Turkish Internet Crackdown, and more Security Woes for Android
Here’s a quick rundown of the most interesting articles across the Internet this week on the topic of SSL and network security. Firefox sneaks out an “inbetweener” update This week Firefox put out a “point release” to address some security issues, according to Paul Ducklin of nakedsecurity.com. Of the three fixes, one relates to SSL […]
Where is your home network vulnerable? Discover common vulnerabilities in your home network by thinking like a burglar.
Two easy-to-use free tools to make SHA-1 migration as easy as possible and provide a free SHA-2 certificate for sites upgrading to SHA-256.
The AOSP browser in pre-4.4 Android devices contains a vulnerability that allows hackers to see the contents of other web pages that are open during a browser session. This vulnerability affects a huge number of Android devices in use right now, and there is even a Metasploit module to exploit it. “This is a privacy […]
This Week in SSL – Mozilla Revokes 1024-bit Roots Certs, Two-Factor Under Attack, Chinese MITM Attacks
Let’s take a look at some of the more intriguing news articles this week about SSL Certificates and network security. Security Growing Pangs Loom For 100K+ Sites with Newly Untrusted Certificates Ericka Chickowski of InformationWeek Dark Reading reveals that last week Mozilla revoked a number of root certificates using 1024-bit keys. These root certificates chained […]
85% sites rely on security from SHA-1 certificates, this could problematic for site owners as Google rushes to end trust in SHA-1 over the next few months.
Penetration testing is to data security what a sparring session is to a boxer and coach. Pentesting is necessary for strengthening a network’s security.