ssl certificate

John Lister's picture

Chrome, Firefox Ditch EV SSL Padlock System

Chrome and Firefox will stop indicating when websites have received an "extra level of verification" to prove they are in fact genuine. The move is largely due to the fact that most users aren't aware of the Extended Validation SSL (EV SSL) system. ... The Extended Validation SSL (secure socket layer) security certificates go beyond the standard SSL certification scheme, which browsers use to show that data being sent to and from a website is in fact encrypted and secure. This means that communication is encrypted, and that no one can eavesdrop or steal data mid-stream. In other words, ... (view more)

Dennis Faas's picture

How to Fix: Send Encrypted Email to Gmail (Postfix, TLS, SSL Certificates)

Infopackets Reader Martin R. writes: " The email newsletter I receive from you is showing in my gmail as "unencrypted," with a red pad lock . There is also a new warning banner that says: 'Be careful with this message. It contains content that's ... typically used to steal personal information.' The options are: learn more, report this suspicious message, ignore, or 'I trust this message.' This is not the only email I get that shows as unencrypted. What does this mean and how can it be fixed? " My response: Essentially it means that the mail you received (at gmail) was not sent using email ... (view more)

Dennis Faas's picture

Hackers Infiltrate SSL Certificates of CIA, MI6

The theft of online security certificates by hackers thought to be from Iran may be even more serious than first thought. The stolen certificates include those for security agencies from the United States, United Kingdom and Israel. The security ... breach originates with DigiNotar, a Netherlands organization that produces Secure Sockets Layer (SSL) certificates which are used by webites. An SSL, for example, is used when home users connect to their banking web sites. Using the SSL certificate, information to and from the home PC to a bank website is encrypted and cannot be intercepted by a third ... (view more)

Dennis Faas's picture

Beware Man-In-The-Middle Hacker Attacks

In an effort to raise awareness, three professional hackers are attempting to prove that trusted web sites make you just as vulnerable to attack as known malicious web sites. At the recent Black Hat and Def Con security conventions, three presenters ... brought light to a new wave of Internet attacks that operate in a similar manner to that of a telephone tap in the shared communication between computers and trusted web sites. "Man-in-the-Middle" Attack This type of computer infiltration, known as "man-in-the-middle" attacks, occur when an online deviant steals the data that is intended to be ... (view more)

Subscribe to RSS - ssl certificate