The Browsers Need to Stop Helping Hackers Phish
A solution for Domain Validation SSL to improve user safety. Phishing is now more prevalent than ever. According to the APWG Internet Policy Committee, 2016 was a record year for…
A solution for Domain Validation SSL to improve user safety. Phishing is now more prevalent than ever. According to the APWG Internet Policy Committee, 2016 was a record year for…
The auction site selling Charlie Sheen’s ’27 Babe Ruth World Series ring is unsecure – tread carefully. The 1927 Yankees are considered one of, if not the greatest baseball team…
A group of Russian hackers has used Britney Spears’ Instagram account to come up with an ingenious malware scheme. The comments section of Britney Spears’ Instagram account was used by…
Symantec Owes its Customers Better, But So Does Google. The ongoing feud between Symantec and the browser community, specifically Google, is bad for the entire SSL industry. Its consequences will…
Phishing attacks will become more prevalent than ever in 2017! January 28th marks the Chinese New Year. It will be another ‘Year of the Rooster’ per the traditional Chinese lunisolar…
Two very different encryption methods, each with a place in the SSL ecosystem Let’s talk about encryption. Specifically let’s talk about two different kinds of encryption: symmetric and asymmetric. Both…
A step-by-step guide for installing a Wildcard SSL Certificate on Cisco ASA 5510 & 5525 Servers Wildcard SSL Certificates are extremely versatile. As opposed to just covering a single domain,…
A quick guide on how to activate SSL in Oracle JDBC Thin Driver Activating SSL in Oracle JDBC Thin Driver is an extremely important step in enacting a much larger,…
A Step-by-Step Guide on how to install an SSL Certificate on Amazon Web Services’ Elastic Load Balancer A load balancer is an impressive tool that takes requests from clients and…
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownPayPal Phishing Certificates Far More Prevalent Than Previously Thought
in Industry Lowdown