Let’s talk about Post-Quantum Encryption
Why all the fervor over a technology that’s still 8-10 years away? We’ve discussed Quantum computing and the potential threat it poses to our current cryptosystems before, but after our…
A comprehensive look at any and all topics related to SSL Certificates, the SSL Protocol and Encryption.
Why all the fervor over a technology that’s still 8-10 years away? We’ve discussed Quantum computing and the potential threat it poses to our current cryptosystems before, but after our…
The US government should be at the forefront of cybersecurity The Department of Homeland Security set a February deadline for all civilian federal government websites to migrate to HTTPS. Now,…
Instructions on how to convert digital certificates from one file format to another We’re going to get a little bit technical today and talk about how to convert a certificate…
The tech giants announced they will be dropping support for the outmoded TLS versions at the start of 2020. Today Apple, Microsoft and Google announced their intentions to deprecate support…
Enough websites still haven’t replaced their Symantec CA brand SSL certificates, so Mozilla is hitting pause. Yesterday we gave one final warning to website owners that with the upcoming release…
Google Chrome 70 will roll out in about a week and all remaining Symantec SSL certificates will be distrusted This is the last week for website owners using Symantec SSL…
Quantum computing represents a major threat to today’s encryption, DigiCert wants to fix that. Quantum-safe Encryption is a concept that needs to come into focus sooner rather than later. This…
Venafi’s Scott Carter offers a word of caution before deploying self-signed certificates. A self-signed certificate is one that you create in-house, using tools like openssl instead of requesting it from…
A rogue certificate can wreak havoc on your company – here’s how to prevent that. One of the most frequent questions we get asked is, “what is a rogue certificate?”…
You may have thought this email series had finished. Psyche! The first post on this series delved into the importance of signing certificates to establish a trust and validity typically…
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownPayPal Phishing Certificates Far More Prevalent Than Previously Thought
in Industry Lowdown