Everything you need to know about SSL Security

Chrome 68: All HTTP Sites to be Marked ‘Not Secure’ from Today!

1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...
Chrome HTTPS Day What Day is Today? It’s the Chrome HTTPS Day! The day we have been hoping for, the day we (well, some of us) have been worshipping for, the day we have been waiting for is finally here! Starting today, Google Chrome will show a ‘Not Secure’ warning to users upon visiting an HTTP webpage. This significant update is set to be rolled out in Chrome 68, to be released today. From the web security point of view, this marks one of the most important days in the history of the web. The crusade Continue Reading

How to View SSL Certificate Details in Every Browser

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...
View SSL Details in Browsers Step-by-step instructions to view SSL certificate details in Chrome, Firefox, Safari, and Internet Explorer The web is moving to HTTPS, and nothing is stopping it. The rise in the usage of HTTPS has been stupendous, and it has resulted in increased awareness amongst users. They know when a site is secure and when it’s not, they know what signs to look for. Some might even want to take a step further by viewing a site’s SSL certificate details. This blog post is intended for such users. If you're Continue Reading

Are EV SSL Certs Worth the Investment? New Survey From DevOps.com Says “Yes!”

1 Star2 Stars3 Stars4 Stars5 Stars (10 votes, average: 2.80 out of 5)
Loading...
EV SSL Worth Investment Are EV SSL Certificates Worth it? New Research Says "Yes"! When it comes to web security, Extended Validation (EV) SSL certificates offer the highest level of trust. Do you know why? That’s because an EV SSL fills two major holes in today’s state of web security—authentication and encryption. The former is accomplished through Green Address Bar—with the organization name inscribed in it. As far as the latter is concerned, the data-in-transit is protected by encryption strength of up to 256-bit. To Continue Reading

5 Most Common Cyber Security Mistakes Enterprises Make

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...
Cyber Security Mistakes Work for an enterprise? Here are 5 cyber security mistakes you must avoid Before we get to most common cyber security mistakes made by enterprises, let’s take a step back and think about the world of 10-15 years ago. Remember how it was? If you're like most people, you’d be using a flip phone, you’d be using that creepy landline phone, you’d be ordering food over the phone, you’d be renting DVDs, and you'd be using those confusing street maps. Now that we look back, we can't help but feel Continue Reading

Google Launches .app Top-Level Domain with HSTS as a Default

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...
HTTPS as a Default for .app .app TLD is launched, and hackers won't like it For a long time, we have been covering Google’s crusade against HTTP. Now Google has taken another step closer to what we’ve it’s been aspiring to—HTTPS Everywhere. Google has just launched .app, its newest TLD from Google Registry. This TLD has been designed specifically for apps and app developers. .app comes with a distinct advantage, and that advantage is HTTPS by default—HSTS in other words. We’ll get to HSTS in a minute but before Continue Reading

Comodo Once Again Acknowledged as the World’s Leading Certificate Authority

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...
Comodo SSL Provider Comodo Recognized as World's Leading SSL Provider Guess who has topped the chart as the world's leading certificate authority? You guessed it right: it's none other than Comodo. Who else could it be? This headline won't come as a surprise to most as Comodo has been leading the march against HTTP for more than a decade. Every single year, Comodo gets recognized as the most prominent CA by various platforms. This time it’s the 2017 TLS Telemetry Report that has identified Comodo as the most-adopted Continue Reading

Apple announces plan to distrust Symantec CA Brand SSL certificates

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...
Apple Distrust Symantec Safari is the third major browser to distrust Symantec Apple has announced its plans to distrust Symantec CA Brand SSL certificates. The distrust will be done in two phases, starting this Summer. If you have followed this story from its beginning, this comes as no surprise. Google announced plans to distrust Symantec CA Brand SSL certificates last year, with the first phase beginning in April. Mozilla has also announced it will distrust Symantec CA Brand SSL certificates in conjunction with Google. Continue Reading

What is SSL/TLS Client Authentication? How does it work?

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...
What is SSL Client Authentication Did you know that SSL can be installed on your PC? Here's everything you need to know You know about SSL/TLS certificates. You know that they’re pretty damn important. And you also know that they're installed on servers. But what if we turn the tables and install an SSL cert on your PC? Sounds cool? Well, it is. Typically, SSL/TLS certificates are installed on servers, and that's why some call them "SSL server certificates." But not many are aware of SSL/TLS with client authentication. SSL/TLS Continue Reading

What is S/MIME? How does it work? Do I need S/MIME?

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...
What is S/Mime Here's everything you need to know about S/MIME certificates S/MIME, the acronym of Secure/Multipurpose Internet Mail Extensions, is a universal web standard defined by the IETF. S/MIME is employed to encrypt MIME data—emails in simple terms. Initially developed by RSA Data Security, it's been made a standard by the IETF and has been defined in many of its documents. S/MIME, based on Public Key Infrastructure or Asymmetric Encryption, facilitates email security by virtue of encryption, authentication, Continue Reading

Public Key and Private Key Pair: How it Works

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...
Public Key vs Private Key Pair Let’s have a look at the role played by the Public–Private Key Pair in Today’s Cryptography Public Key and Private Key pair is the core component of public key cryptography. These keys are responsible for carrying out encryption and decryption. Both keys are co-related to each other. That means that one private key can only have one public key and vice versa. To put this in even more simple words, they both come in pairs – a private/public key will only work with the public/private key associated Continue Reading