Breaking encryption will be the new Prohibition

Breaking encryption will be the new Prohibition

Encryption backdoors are a terrible example, here’s a historical example to showcase why… On Tuesday, speaking at a cybersecurity conference in New York, US Attorney General William Barr paid homage... The post Breaking encryption will be the new Prohibition appeared first on Hashed Out by The SSL Store™ ... Read More
Phishing Definition

Pinning down a Phishing Definition

How do you define phishing? Chances are, your definition varies just like everyone else's. So, how SHOULD we define phishing? The post Pinning down a Phishing Definition appeared first on Hashed Out by The SSL Store™ ... Read More
TLS 1.3: Everything you need to know

TLS 1.3: Everything you need to know

TLS 1.3 was officially published as RFC 8446 last Summer. Here's everything you need to know about the newest version of the protocol. The post TLS 1.3: Everything you need to know appeared first on Hashed Out by The SSL Store™ ... Read More
The SSL Store and ManageEngine team up to simplify Certificate Management

The SSL Store and ManageEngine team up to simplify Certificate Management

A powerful, new, one-stop solution for all your digital certificate and key management needs For the past decade The SSL Store™ has built its reputation as the premier SSL service... The post The SSL Store and ManageEngine team up to simplify Certificate Management appeared first on Hashed Out by The ... Read More
Twitter will deprecate support for TLS 1.0, TLS 1.1 on July 15

Twitter will deprecate support for TLS 1.0, TLS 1.1 on July 15

All Twitter connections will require TLS 1.2 starting Monday On Monday, July 15, Twitter will drive another nail into the coffin of TLS 1.0 and TLS 1.1. The social media... The post Twitter will deprecate support for TLS 1.0, TLS 1.1 on July 15 appeared first on Hashed Out by ... Read More
What is Shadow IT?

What is Shadow IT?

Shadow IT + Digital Certificates = Ticking Timebomb When your employees use software or hardware at work that your IT or security team is unaware of – that’s Shadow IT.... The post What is Shadow IT? appeared first on Hashed Out by The SSL Store™ ... Read More
Phishing-as-a-Service: Turn-key Phishing Kits

Phishing-as-a-Service: Turn-key Phishing Kits

Cyren reports finding over 5,334 unique phishing kits just this year Historically, phishing – like most cybercrimes – has had a technical barrier to entry. As in, you needed to... The post Phishing-as-a-Service: Turn-key Phishing Kits appeared first on Hashed Out by The SSL Store™ ... Read More
Encryption helped win America’s Revolutionary War

Encryption helped win America’s Revolutionary War

Encryption is nothing new, in fact it's been helping secure communication for ages. Here's how the Culper Spy Ring employed encryption to help when the United States' independence from Britain. The post Encryption helped win America’s Revolutionary War appeared first on Hashed Out by The SSL Store™ ... Read More
The Difference Between Root Certificates and Intermediate Certificates

The Difference Between Root Certificates and Intermediate Certificates

That end user SSL certificate is only one part of a certificate chain. Let’s talk about intermediate and root CA certificates for a few minutes. SSL (or more accurately, TLS)... The post The Difference Between Root Certificates and Intermediate Certificates appeared first on Hashed Out by The SSL Store™ ... Read More
HTTPS Phishing: The rise of URL-based attacks

HTTPS Phishing: The rise of URL-based attacks

A new FireEye report shows a recent spike in URL-based HTTPS phishing attacks If you’re a regular reader of Hashed Out, you know that we have been sounding the alarm... The post HTTPS Phishing: The rise of URL-based attacks appeared first on Hashed Out by The SSL Store™ ... Read More

Secure Guardrails