The media is full of stories about how phishing sites are moving rapidly to encryption using anonymous, free DV certificates…
The media is full of stories about how phishing sites are moving rapidly to encryption using anonymous, free DV certificates…
Since Peter Shor published his eponymous algorithm for factoring composite numbers in 1994, cryptographic experts have speculated over whether and when the…
Code Signing is a cryptographic process to digitally sign executables and scripts. The signature confirms the software author or publisher’s…
Looking Back at 2016 Fortunately, 2016 was not a year full of SSL/TLS vulnerabilities. Although some researchers did prove old cryptography…
If you take a look back through classic literature, particularly fairy tales, there are some themes that emerge. Parental abandonment is…
Is your organization ready? Do you have a data governance program or security audit? Do you know what your IT…
Google is making security icon changes in the Chrome status bar. The changes are based on a research paper prepared…
At Black Hat USA 2016, doctoral candidates Mathy Vanhoef and Tom Van Goethem presented HEIST, an SSL/TLS vulnerability. HEIST is short…
Emerging vulnerabilities underscore the argument for creating a safer Internet for everyone including domain owners by using HTTPS Everywhere, as…
In the past few years, financial institutions have started dealing with a new breed of robber, the cybercriminal. One prominent…