Symantec to Transition to New PKI Root Structure

Implementation of new Web PKI Hierarchy Symantec will be updating its Web PKI hierarchy to modernize and streamline their Public SSL/TLS certificate offerings, and align with changes requested by the browser community. Symantec expects to issue all new Public SSL/TLS certificates from new intermediate CAs by December 1, 2017.  These changes will apply to all […]

Read More LoadingAdd to favorites

What is Certificate Transparency?

Google’s Certificate Transparency is an open source project that aims to strengthen the SSL/TLS certificate system, which is the main cryptographic security system that underlies all HTTPS secure connections. It is a extra tier of certificate security that forms a Security Triad to ensure that clients navigating the internet are safe and secure in regards to […]

Read More LoadingAdd to favorites

SSLv2 – The “Drown” Attack

Just recently there has been a lot of news regarding a vulnerability with SSLv2 (SSL2.0) and what has been named the Drown Attack. You will see articles saying “Drown Attack effects over 1/3 of the worlds websites, ” “No one is secure on the internet anymore,”  More than a Million sites effected!” etc.. the list goes […]

Read More LoadingAdd to favorites

OpenSSL patch released that fixes High-severity Diffie Hellman bug

OpenSSL has fixed a high-severity vulnerability that made it possible for attackers to obtain the key that decrypts communications secured in HTTPS based on the ephemeral keys, DSA based Diffie Hellman (DH) key exchange. The OpenSSL Diffie Hellman issue got assigned CVE-2016-0701 with a severity of High. This vulnerability could allow an attacker to force the peer to perform […]

Read More LoadingAdd to favorites

SHA 1 Critical Vulnerability Notice

On October 8, 2015, a team of international cryptography researchers warned of a significantly increased risk in using SHA-1 certificates, and recommended that administrators accelerate their migration to SHA-2 certificates. The risk is that, with enough computing power, an attacker can craft a fake certificate that in all key respects appears to be signed by […]

Read More LoadingAdd to favorites

How to fix Alternative chains certificate forgery (CVE-2015-1793)

How to fix Alternative chains certificate forgery (CVE-2015-1793):Critical OpenSSL vulnerability could allow attackers to intercept secure communications. What is it: An error in the implementation of the alternative certificate chain logic could allow an attacker to cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a […]

Read More LoadingAdd to favorites

OpenSSL: Alternative Chains Certificate Forgery Vulnerability (CVE-2015-1793)

Critical OpenSSL vulnerability could allow attackers to intercept secure communications with the new Alternative Chains Certificate Forgery Vulnerability (CVE-2015-1793) A critical new vulnerability in OpenSSL could allow attackers to intercept secure communications by tricking a targeted computer into accepting a bogus digital certificate as valid. This could facilitate man-in-the-middle (MITM) attacks, where attackers could listen […]

Read More LoadingAdd to favorites