+1-888-690-2424
  • Moving Forward with Certificate Transparency

    As we move in 2015, you will start to see Certificate Transparency deployed on EV SSL certificates. Google has required that as of January 2015, all EV SSL certificates be publicly logged to retain their EV status. All current EV SSL certificates will be white listed for the Chrome browser. Google Chrome will be the only browser supporting Certificate Transparency.

        in EV SSL, SSL, SSL Deployment
    0
  • Monitor Your Domains with Certificate Transparency

    Over the last few years, we’ve witnessed publicly trusted SSL certificates issued to domain names that were not authorized. These miss-issuances are typically caused by attackers or simply a mistake by a certification authority (CA). Miss-issuance has been detected in a brute-force manner. Typically, when someone discovers a suspicious issue, they may report it and it may be investigated. Eventually,

        in EV SSL, SSL, SSL Deployment
    0
  • More Google Fraudulent Certificates

    On July 2, Google became aware of fraudulent certificates that were incorrectly issued to Google-owned domain names. The certificates were issued by National Informatics Centre (NIC) of India, which is a subordinate certification authority (CA) to Indian Controller of Certifying Authorities (India CCA). The miss-issued certificates could have been used to spoof content, perform phishing attacks or perform man-in-the-middle (MITM)

        in Fraud Detection, SSL
    0
  • SSL Review: March 2014, Part 2

    Part 4 of 10 in the Series — SSL Review
    Entrust’s monthly review of SSL discussions — and likely other digital certificates — recaps news, trends and opinions from the industry. March brought us discussions about ECC, ICANN, domain validation, HTTPS and more.

        in SSL
    0
  • More Google Fraudulent Certificates

    On July 2, Google became aware of fraudulent certificates that were incorrectly issued to Google-owned domain names. The certificates were issued by National Informatics Centre (NIC) of India, which is a subordinate certification authority (CA) to Indian Controller of Certifying Authorities (India CCA). The miss-issued certificates could have been used to spoof content, perform phishing attacks or perform man-in-the-middle (MITM)

        in Fraud Detection, SSL
    0
  • SSL Review: March 2014, Part 2

    Part 4 of 10 in the Series — SSL Review
    Entrust’s monthly review of SSL discussions — and likely other digital certificates — recaps news, trends and opinions from the industry. March brought us discussions about ECC, ICANN, domain validation, HTTPS and more.

        in SSL
    0
Page 1 of 3123