certificate
Understanding Certificate Policies and Practice Statements
Public key infrastructure (PKI) is the sort of technology that most users take for granted. They use it every day in a variety of ways but most don’t even realize it. PKI ...
Keyfactor, PrimeKey to Advance Certificate Automation
Keyfactor announced this week announced it intends to merge with PrimeKey as part of an effort to enable organizations to more easily manage certificates on an end-to-end basis. The company also revealed ...
PolarProxy 0.8.16 Released
We are happy to announce a new release of the TLS decryption tool PolarProxy. The new version has been updated to support features like client certificates and a PCAP-over-IP connector. Client Certificates ...
PolarProxy 0.8.16 Released
We are happy to announce a new release of the TLS decryption tool PolarProxy. The new version has been updated to support features like client certificates and a PCAP-over-IP connector. Client Certificates ...
TLS Certificate Lifespans Now Capped at 13 Months
TLS Certificate Lifespans Now Capped at 13 Months As of September 01, 2020, TLS certificates that are issued on or after that date will have validities that are capped at 398 days ...
Let’s Encrypt Says It Will Revoke 3M Certificates Due to Software Bug
Non-profit certificate authority (CA) Let’s Encrypt announced it will revoke more than three million digital certificates due to a software bug. On March 3, Let’s Encrypt revealed its plan to revoke 3,048,289 ...
Apple Goes Rogue, Drops Unilateral TLS Certificate Guillotine
Safari will no longer trust certificates that last longer than 13 months. Yes, you read that right; IT and DevOps are spitting blood ...
Forgot to Renew Your TLS Certificate, Microsoft?
Microsoft Teams went dark for seven hours yesterday. It turns out the Teams team forgot to renew a TLS certificate ...
Large Percentage of Malware Downloads Are Signed with Valid Certificates
The misuse of code signing certificates is so widespread that a larger percentage of malware downloaded to computers is digitally signed than that of benign software programs. Antivirus company Trend Micro studied ...
Patching an Android Application to Bypass Custom Certificate Validation
One of the important tasks while performing mobile application security assessments is to be able to intercept the traffic (Man in The Middle, MiTM) between the mobile application and the server by ...