(10 votes, average: 2.60 out of 5)
While other CAs are revoking millions of certificates, Comodo CA is 100% compliant
Over the past few weeks the digital certificate industry, as well as the greater cybersecurity community, have been busy debating adding a new root certificate. In their attempts to find a technical reason to disqualify the new root request, a researcher inadvertently turned up a misconfiguration in the EJBCA CA tool that many other CAs use to generate serial numbers.
According to the Baseline Requirements that govern Continue Reading
Looking at the cybersecurity trends from April-June of 2018
Comodo Threat Research Labs (CTRL) conducts thorough research and analysis of the cybersecurity threats that continue to plague us online. The research team consists of over 120 security professions and computer scientists who study all prevalent cyber threats to develop strategies and insights on how to keep our online environment safe.
In this article, we’ll present an abridged version of their findings as compiled in the Comodo Continue Reading
In the US, October is an important month for the cyber security industry. October has been designated as National Cyber Security Awareness Month (NCSAM) in an attempt to raise awareness about the necessity of cyber security measures in the age of information technology.
2020 happens to be the 17th year of the National Cyber Security Awareness Month initiative. Over the past couple of years, this initiative has helped mainstream the conversation on cybersecurity and its importance.
National Cyber Continue Reading
What Day is Today? It’s the Chrome HTTPS Day!
The day we have been hoping for, the day we (well, some of us) have been worshipping for, the day we have been waiting for is finally here! Starting today, Google Chrome will show a ‘Not Secure’ warning to users upon visiting an HTTP webpage. This significant update is set to be rolled out in Chrome 68, to be released today. From the web security point of view, this marks one of the most important days in the history of the web.
The crusade Continue Reading
Step-by-step instructions to view SSL certificate details in Chrome, Firefox, Safari, and Internet Explorer
The web is moving to HTTPS, and nothing is stopping it. The rise in the usage of HTTPS has been stupendous, and it has resulted in increased awareness amongst users. They know when a site is secure and when it’s not, they know what signs to look for. Some might even want to take a step further by viewing a site’s SSL certificate details. This blog post is intended for such users. If you're Continue Reading
Are EV SSL Certificates Worth it? New Research Says "Yes"!
When it comes to web security, Extended Validation (EV) SSL certificates offer the highest level of trust. Do you know why? That’s because an EV SSL fills two major holes in today’s state of web security—authentication and encryption. The former is accomplished through Green Address Bar—with the organization name inscribed in it. As far as the latter is concerned, the data-in-transit is protected by encryption strength of up to 256-bit.
Work for an enterprise? Here are 5 cyber security mistakes you must avoid
Before we get to most common cyber security mistakes made by enterprises, let’s take a step back and think about the world of 10-15 years ago. Remember how it was? If you're like most people, you’d be using a flip phone, you’d be using that creepy landline phone, you’d be ordering food over the phone, you’d be renting DVDs, and you'd be using those confusing street maps. Now that we look back, we can't help but feel Continue Reading
.app TLD is launched, and hackers won't like it
For a long time, we have been covering Google’s crusade against HTTP. Now Google has taken another step closer to what we’ve it’s been aspiring to—HTTPS Everywhere. Google has just launched .app, its newest TLD from Google Registry. This TLD has been designed specifically for apps and app developers. .app comes with a distinct advantage, and that advantage is HTTPS by default—HSTS in other words.
We’ll get to HSTS in a minute but before Continue Reading