Microsoft Wants You To Ditch TLS 1.0 and 1.1 Support
Windows Server 2008 Will Receive TLS 1.2 Capability Later This Year TLS 1.3, the upcoming update to our favorite security protocol, is still just around the corner. But for most…
Windows Server 2008 Will Receive TLS 1.2 Capability Later This Year TLS 1.3, the upcoming update to our favorite security protocol, is still just around the corner. But for most…
Mozilla’s Observatory Tool Assess Website Security – And Many Fall Short. April King, a security engineer at Mozilla, found that the vast majority of the world’s largest sites – 93.45%…
Official Password Guidelines Validate What the Security Community Has Said For Ages The U.S. National Institute of Standards and Technology, or NIST, is heavily involved in setting security standards and…
The aggregation of voter data – which includes partial social security numbers – is a privacy concern. The full names, addresses, dates of birth, and political affiliation of 200 million…
Run Windows Powershell to Fix This Bug and Install Chrome. This was a rather perplexing bug I came across when trying to install Google Chrome on Windows: The full error…
The auction site selling Charlie Sheen’s ’27 Babe Ruth World Series ring is unsecure – tread carefully. The 1927 Yankees are considered one of, if not the greatest baseball team…
Features That Require Permissions Need To Use Secure Contexts Google engineers have announced that the Presentation API will be disabled over insecure origins in Chrome 67, due for release around…
The Show’s Massive MiTM Attack Could Work – But These Security Measures Can Keep You Safe Minor Spoilers for Silicon Valley Season 4 Episode 9, “Hooli-Con.” This week’s Silicon Valley…
Abandoned Software is a Security Risk That Manufactures Must Take Responsibility For A researcher found that Samsung abandoned its “S Suggest” app which could have opened a security vulnerability for…
Understanding the Precertificate Format and its Functionality in Certificate Transparency. Precertificates are a special type of SSL certificate that are used as part of Certificate Transparency (CT). Precertificates are distinguished…
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownPayPal Phishing Certificates Far More Prevalent Than Previously Thought
in Industry Lowdown