5 PKI Trends to Expect in the Next Year

Public Key Infrastructure (PKI) is the glue that holds the internet together. As the internet has developed into a multi-faceted ecosystem with every single ‘thing’ now considered an internet-connected endpoint, PKI has also had to develop quickly in order to meet the demands of the market. Back in the early 2000s, there weren’t many regulations … Read More The post 5 PKI Trends to Expect in the Next Year appeared first on The State of Security.
Read more

E-Mailing Private HTTPS Keys

I don't know what to make of this story: The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted certificate authorities Comodo and, until recently, Symantec. It was sent to Jeremy Rowley, an executive vice president at DigiCert, a certificate authority that acquired Symantec's certificate issuance business after Symantec...
Read more

Cybersecurity New Year’s resolutions, you say? Why not.

It’s no surprise that our resolutions are usually about health, finances, relationships, and self-improvement. As all of us live digital lives, too, why not think up cybersecurity New Year's resolution that concern our online health and safety? Categories: 101 FYI Tags: cybercybersecuritycybersecurity resolutionsHTTPSnew year's resolutiontwo-factor authentication (Read more...) The post Cybersecurity New Year’s resolutions, you say? Why not. appeared first on Malwarebytes Labs.
Read more

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. The post Phishers use encrypted sites to scam appeared first on Health Security Solutions.
Read more

KRACK hacks: What you need to know

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. The post KRACK hacks: What you need to know appeared first on Health Security Solutions.
Read more

Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable

A serious flaw in the wireless protocol that secures all modern protected Wi-Fi networks has been discovered. If your device supports Wi-Fi, it is most likely affected. This feasible attack, dubbed KRACK, could abuse design or implementation flaws in the Wi-Fi standard, not some specific hardware.  Categories: Exploits FYI Mobile Tags: cybersecurityfirmwareHTTPSKRACKWi-Fi (Read...
Read more
Page 1 of 212