What Is PKI? A Crash Course on Public Key Infrastructure (PKI)

What Is PKI? A Crash Course on Public Key Infrastructure (PKI)

Ever wondered what public key infrastructure (PKI) is and how it works? It’s only one of the most critical systems used to ensure authentication, data integrity, and privacy… The world... The post What Is PKI? A Crash Course on Public Key Infrastructure (PKI) appeared first on Hashed Out by The ... Read More
Graphic of the Chrome 81 - Chrome 86 updates that are planned for release

Browser Watch: Google Chrome to Block HTTP Downloads

Starting mid-2020, you won’t be able to download certain files on Chrome — here’s why Time after time, we’ve witnessed browser giants making security-related decisions that have a significant impact... The post Browser Watch: Google Chrome to Block HTTP Downloads appeared first on Hashed Out by The SSL Store™ ... Read More
Graphic: What is a rootkit? Breaking down the levels of privilege.

What Is a Rootkit and How Does It Work?

Here’s everything you need to know about the most dangerous breed of security threats The cyber security industry might not have perfected the techniques to thwart security threats completely, but... The post What Is a Rootkit and How Does It Work? appeared first on Hashed Out by The SSL Store™ ... Read More
Screenshot: PayPal phishing email scam example from WeLiveSecurity by ESET

The Latest PayPal Phishing Email Goes Beyond Your Login Credentials

Another day and another clever PayPal phishing scam to learn from to better protect yourself and your organization “In this world, nothing can be said to be certain, except death,... The post The Latest PayPal Phishing Email Goes Beyond Your Login Credentials appeared first on Hashed Out by The SSL ... Read More
BIMI and Verified Mark Certificate example on Yahoo Mail

Verified Mark Certificates & the BIMI Standard: Show Your Company Logo in Your Customer’s Inbox

Learn about BIMI — a new email standard that could boost your email visibility, build customer trust, and help fight phishing If your job is related to email marketing, terms... The post Verified Mark Certificates & the BIMI Standard: Show Your Company Logo in Your Customer’s Inbox appeared first on ... Read More
Graphic: An example of a Dropbox phishing email

Dropbox Phishing Scam: Don’t Get Fooled by Fake Shared Documents

Hackers use familiar brands like Dropbox to steal login credentials and spread malware It’s funny how hackers, phishers, and scamsters can be blatantly obvious and inexplicably unpredictable at the same... The post Dropbox Phishing Scam: Don’t Get Fooled by Fake Shared Documents appeared first on Hashed Out by The SSL ... Read More
Graphic: delegated credentials

Delegated Credentials: Facebook, Mozilla & Cloudflare’s New TLS Protocol Explained

Here’s what you need to know about delegated credentials and how they’ll affect your certificate management Facebook, Mozilla, and Cloudflare just announced the development of delegated credentials, a new cryptographic... The post Delegated Credentials: Facebook, Mozilla & Cloudflare’s New TLS Protocol Explained appeared first on Hashed Out by The SSL ... Read More
Graphic: Illustration of link encryption ("normal" encryption)

End-to-End Encryption: The Good, the Bad and the Politics

Here’s what you need to know about the debate over end-to-end encryption It’s that time of the year when we grab our popcorn and witness another chapter in the age-old... The post End-to-End Encryption: The Good, the Bad and the Politics appeared first on Hashed Out by The SSL Store™ ... Read More