Blog Archives

Interception SSL via the proxy server

Many people believe that SSL is the golden standard in network security. Yes, SSL helps protect you from different problems, but SSL communications can still be intercepted and disrupted. As it is, see this article. How exactly this happens, see

Posted in Vulnerabilities Tagged with: , , , , , , ,

Most banking applications exposed to threats

Smartphone owners are accustomed to trust your applications, especially if they relate to the banking sector. However, according to experts of the company IO Active, most banking applications are very insecure and in need of major improvement. Security researchers tested

Posted in Vulnerabilities Tagged with: , , , , ,

Google, Microsoft and Yahoo want to make email resistant to MITM attacks

In the era of Apple vs FBI and large-scale hacking on a regular basis, many people are beginning to realize that our data are not so well protected as they should be. Google, Amazon, Facebook, Microsoft and many other technological

Posted in Vulnerabilities Tagged with: , , , , ,

Revoked TLS certificates can still be compromised

Security researchers working for the company Sucuri, have decided to revise the report, written back in 2012, dedicated to the API-call security. API calls must verify the integrity of such libraries as JSSE, OpenSSL and of GnuTLS, or transport libraries

Posted in Validation, Vulnerabilities Tagged with: , , , , , , ,

All about SSL

This site is dedicated to SSL-certificates. You will learn what is an SSL certificate, how to issue and reissue it. FAQ SSL will be useful for both novices and pros. SSL Knowledgebase contains sections on validation, trust logo, vulnerabilities, SSL-certificates differences by type (Wildcard, EV, DV, etc.), as well as many other things.