On October 13, 2015, Google released Chrome 46. Chrome 46 introduces an icon change in the URL address bar for sites with minor HTTPS connection errors. Minor errors include a lack of Certificate Transparency (CT) information and/or use of SHA-1 certificates, obsolete cipher suites, and certain types of mixed content. In an effort to encourage […]
Manufacturers should take responsibility for the encryption and authentication of IoT devices.
Research findings do not directly undermine the security of the Internet at large. Given the lessons learned with the MD5 full break, it is not advisable to wait until these become practically possible.
The health industry is subject to 340% more security incidents when compared with other industries.
87% of users said they immediately trust their private information on a website secured by an EV SSL Certificate.
A recent Google study reveals that best practices vary greatly among security experts and non-experts. The gap between the two groups not only suggests practices that non-experts should implement, but also shows room for improvement in communicating these best practices.
Effective user authentication has a massive impact on the success or failure of any platform’s security. Learning how to practice more effective user authentication will improve your defense against hackers.
Employees who are uneducated about best security practices can be a vulnerability to enterprises and are the leading cause of company security breaches.
This year’s DEF CON illustrated vulnerabilities in smart automobiles, encouraging IoT manufacturers to make security a top priority.