All “Secure Contexts” Only Features In Chrome
Complete List of HTTPS-Only Features in Chrome In order to keep users secure, Chrome has restricted a number of features to “secure origins” only. On the web, this usually means…
Everything you need to know about the latest trends and what’s making news in the SSL Industry.
Complete List of HTTPS-Only Features in Chrome In order to keep users secure, Chrome has restricted a number of features to “secure origins” only. On the web, this usually means…
When it comes to HTTPS and Google, there’s a lot more at stake than just your safety Google is making a hard push towards universal encryption in 2017. In truth,…
A solution for Domain Validation SSL to improve user safety. Phishing is now more prevalent than ever. According to the APWG Internet Policy Committee, 2016 was a record year for…
Windows Server 2008 Will Receive TLS 1.2 Capability Later This Year TLS 1.3, the upcoming update to our favorite security protocol, is still just around the corner. But for most…
Official Password Guidelines Validate What the Security Community Has Said For Ages The U.S. National Institute of Standards and Technology, or NIST, is heavily involved in setting security standards and…
Features That Require Permissions Need To Use Secure Contexts Google engineers have announced that the Presentation API will be disabled over insecure origins in Chrome 67, due for release around…
Abandoned Software is a Security Risk That Manufactures Must Take Responsibility For A researcher found that Samsung abandoned its “S Suggest” app which could have opened a security vulnerability for…
App Developers Can No Longer Dictate GeoLocation Permissions Apple has unveiled an important privacy improvement with iOS 11: The ability to control how an app collects your location data. iOS…
Announced at WWDC: LibreSSL, TLS 1.3 Beta, New Revocation Checking, & More Last week Apple hosted their annual WWDC conference for developers. One of the big announcements was the new…
Security Changes in Chrome 59: worker-src support, rate limits on permission requests and headless chrome… It’s time to talk security changes in Chrome 59. In this release, Google went pretty…
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownPayPal Phishing Certificates Far More Prevalent Than Previously Thought
in Industry Lowdown