Thousands of connected devices use default settings, making them vulnerable to attack. You may not think much of this when you’re hurrying to set up a new router without customizing the network or password—after all, we just want to start using our new gadgets. But imagine what happens when hundreds of these internet-connected devices, including […]
With more devices connected to the internet than ever before, we’re all interested in finding out how the latest gadget will make our life easier. But usually, as consumers, the furthest thing from our minds is how a device will stay up-to-date and if there is security built-in. Device manufacturers are more mindful of both […]
That’s one heck of a headline, I know, but things just got real for Wi-Fi security Monday morning. Mathy Vanhoef of imec-DistriNet and Frank Piessens at KU Leuven published the results of their hard work on the authentication mechanism of the WPA2 protocol (which is used by Wi-Fi as a security layer for data traveling […]
This new partnership will accelerate development, increase the speed of innovation, and ensure continuous delivery of certificates for DevOps environments.
We are often blinded by the “awe” factor of new technology. But before jumping in head first, take time to make sure the pros are worth the cons.
According to Gartner, public key infrastructure (PKI) will re-emerge as one of the most relevant mechanisms for organizations to address the IoT authentication problem.
Only 35% of SMTP server have configured encryption protocols correctly. Low adoption rates of encryption and authentication and improper configuration can lead to a STRIPTLS attack.
DigiCert offers EV SSL Certificates for .onion addresses with a maximum validity period of 15 months.
Effective user authentication has a massive impact on the success or failure of any platform’s security. Learning how to practice more effective user authentication will improve your defense against hackers.