Blog Archives

Interception SSL via the proxy server

Many people believe that SSL is the golden standard in network security. Yes, SSL helps protect you from different problems, but SSL communications can still be intercepted and disrupted. As it is, see this article. How exactly this happens, see

Posted in Vulnerabilities Tagged with: , , , , , , ,

Using SSL-certificate for protects against breaking of passwords on the site

A common way to hack the site – get passwords to the administrative panel of the site. Basically passwords obtained in the following ways: intercept the password that has been transmitted through unprotected HTTP protocol; pick the password by brute

Posted in Vulnerabilities, What is an SSL-Certificate Tagged with: , , ,

The transition to the use of TLS in payments for compliance with the PCI

PCI SSC has officially announced the postponement of the deadline for the use of unsecure cryptographic SSL protocol with the June 2016 to June 2018. The decision was made in response to requests representatives of industry and information security community

Posted in Validation, Vulnerabilities Tagged with: , , , , ,

Most banking applications exposed to threats

Smartphone owners are accustomed to trust your applications, especially if they relate to the banking sector. However, according to experts of the company IO Active, most banking applications are very insecure and in need of major improvement. Security researchers tested

Posted in Vulnerabilities Tagged with: , , , , ,

Fraudsters use SSL-certificates for phishing

CAs provides the SSL-certificate to owner of fake domains used in phishing against known online stores and banks. Just in a month attackers were able to obtain official security lock for hundreds of fake websites that are aimed at banks

Posted in Vulnerabilities Tagged with: , , , ,

6 vulnerabilities in OpenSSL have been fixed

OpenSSL cryptographic library has released an update which will fix the six discovered issues. Only two of them are labeled as “critical”. OpenSSL is an important part of the Internet infrastructure, because it is one of the most widely used

Posted in Vulnerabilities Tagged with: , , , ,

Why is there a huge number of invalid certificates?

The spread of invalid certificates is wide enough. It is difficult to find anyone who has never encountered them. Here are some reasons that lead to such a wide spread of invalid certificates: Incorrectly configured virtual hosting Most sites now

Posted in Vulnerabilities Tagged with: , , , ,

Sidejacking and how to beat it with SSL

Sidejacking – a special kind of theft, where an attacker intercepts traffic of user sessions, ie, for example, the traffic between the Wi-Fi router and user connect to the internet. We can find the plug-in Firefox, which automates session hijacking

Posted in Vulnerabilities Tagged with: , , , , ,

Best practices of SSL-Certificate Management

How to manage SSL-certificates to achieve effective protection of the web site? We will review current methods and established practices in this article. Having the installed SSL-certificate does not guarantee overall protection of your web site. Each SSL-certificate has its own private

Posted in How to install SSL Certificate, Vulnerabilities Tagged with: , , , ,

All about SSL

This site is dedicated to SSL-certificates. You will learn what is an SSL certificate, how to issue and reissue it. FAQ SSL will be useful for both novices and pros. SSL Knowledgebase contains sections on validation, trust logo, vulnerabilities, SSL-certificates differences by type (Wildcard, EV, DV, etc.), as well as many other things.