Website Security Solutions | Latest Guides | Blog

Understanding Certificate Cross-Signing

| #Articles

Certificate Cross-Signing is a nuance of PKI which is often poorly understood. This topic is particularly salient as of late, as a long-lived root certificate managed by Sectigo (formerly Comodo) expired, causing many unexpected problems for many legacy systems worldwide. But how can certificate expiration lead to service downtime? Who is responsible for being aware that this can happen? How can… [read more →]

When to use a Wildcard SSL Certificate

| #Articles

SSL/TLS uses x509 certificates to secure digital communications. These certificates are bound to a particular DNS name, and signed by a Certificate Authority. Browsers attempt to validate the certificate by chaining back to a root certificate in its root certificate store. If a website does not have an SSL/TLS certificate installed that matches the DNS name by which it was accessed, it is an… [read more →]

Let’s Encrypt Revokes 3 Million Certificates

| #Articles

On Friday February 28th, Let’s Encrypt made the tough decision to revoke over 3 million certificates they had issued due to a bug in the software they use to validate CAA records. This gave companies relying on Let’s Encrypt under a week to replace these certificates on their endpoints. While this procedure did not necessarily require downtime (depending on the specific server configuration) it did… [read more →]

Zero-Day Vulnerabilities and its Impact on Business

| #Articles #Security

Computer System Vulnerabilities are a serious security issue that can find its way to our computers through harmless browsing activities. This can be as simple as visiting a website, clicking on a compromised message or downloading software with compromised security protocols. Exploited and infected malware exposes our systems, allowing unauthorized control to the hackers. The system becomes… [read more →]

TLS 1.3, HTTP/3 and DNS over TLS - 2019 Highlights

| #Articles #Security

2019 has been a big year for digital cryptography. The privacy minded should be very excited about changes on the horizon. Specifically, some of the biggest changes around the corner are: TLS 1.3 HTTP/3 Widespread support for DNS over TLS TLS 1.3 RFC 8446 finalized the specification of TLS 1.3.With it includes faster connection times, deprecation of insecure ciphers, simplified negotiation of… [read more →]

The Future of the Australian CyberSecurity Strategy

| #Articles #Security

Cyber Security Discussion Paper Australia's Cybersecurity Concerns Improving Australia’s Cybersecurity Strategy / Building Alliances Joint Working Group with India Cybersecurity Framework Cyber Security Discussion Paper Australia launched its first Cybersecurity strategy back in 2016. This new cybersecurity model was set to last from 2016 through 2020. Earlier this month ASPI’s International Cyb… [read more →]

The Quick Guide to Ransom Attacks

| #Articles #Security

What is Ransomeware and Ransom Attacks? How does it work? A History of Ransom Attacks. Types of Ransomware. How to Protect Against Ransom Attacks? What to do if you are affected by ransomware encryption. What is Ransomeware and Ransom Attacks? Ransomware is malicious software that blocks, or denies access to a computer system or data until a ransom is paid by the victim. A ransom usually has a… [read more →]

The Quick and Easy Guide to PCI Compliance

| #Articles #Security

What is it PCI Compliance? Who is it for? 4 Levels of PCI Compliance Why do we need it? PCI Compliance Requirements Firewall Change IDs and Passwords Protect cardholder data-at-rest Protect cardholder data-in-transit AntiVirus Develop and Maintain secure systems and applications Restrict access to Data Unique ID and Authentication Restrict… [read more →]

Cloud Computing, Recent Hacks and Security Risks of 2019

| #Articles #Hacks #Security

What is Cloud Computing? Cloud Computing Risks Lack of Control and Availability Data Security Lost Data The Capital One Data Breach Cloud Computing Hack affects PCM Is Cloud Computing Worth it? What is Cloud Computing? Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a… [read more →]

Route Poisoning: Why we need SSL/TLS

| #Articles

SSL/TLS is the bedrock of modern security. Just about all security strategies involve it or chain back to it at some point. At its core, the contract is this: something encrypted with a user’s public key can only be decrypted by the corresponding private key, and something encrypted with the user’s private key can only be decrypted by the corresponding public key. From this we derive digital sig… [read more →]

Microsoft’s Active Directory Federated Services – A popular choice for SSO

| #New Tech #Articles

Pretty much everyone in the digital age has access to multiple services requiring authentication. Most modern workplaces have some sort of centralized authentication source, so at least there’s only one set of credentials to remember. Still, typing in these credentials repeatedly is burdensome for the user. An answer to this problem is browser-based federation, leveraging bearer tokens (something a… [read more →]

Is your wordpress blog secure from hackers?

| #Articles

Wordpress is one of the most popular website platform for creating websites and blogs.  The reason for its popularity is obviously is the ease of use, maintaining it and also updating content to it. Every popular software, becomes a target of criminals automatically due to widespread use of it and many users actually using it. Brute password discovery and PHP MySql vulnerabilities is often the … [read more →]

Perfect Forward Secrecy: An Insurance Policy for your Encrypted Data

| #Articles

As we already know, SSL/TLS couples the best parts of asymmetric and symmetric cryptography to provide a robust mechanism for securing data-in-flight. However, because the key exchange for the symmetric portion of the transaction occurs over the secure channel forged with your public key, whomever holds your private key can reliably decrypt all data intended for your consumption. What happens… [read more →]

Who Needs SSL?

| #Articles

Does everyone need SSL? It’s not mandatory for all sites - for now. Do most sites need it? Yes. Do you need it? Let’s find out. Firstly, Why SSL? Trust Internet users look for many trust signals when they visit a website. For casual browsing, their eyes and senses do a cursory review of the site they’re on for a visual and performance indication of quality. Does anything look out of place or suspi… [read more →]

Current SSL Security holes, tips and concerns

| #Articles

Technology and software is always changing and getting better, but with new releases comes new bugs and security holes. Or sometime old bugs and security holes that have only just been discovered come to light. SSL certificates and website security is no exception to this. In the last few months alone there has been multiple security holes found in the very popular OpenSSL that many servers and… [read more →]

Placing the advantages of SSL certificates in the limelight

| #Articles

Gone are the days where the masses took up the trouble of driving down to different shops to purchase items/accessories of any kind. After all, who would take up such a trouble, when they have the liberty of ordering anything without leaving the comforts of their home and that too with few mouse clicks? Yes, online shopping is booming with time and the master minds behind respective websites that… [read more →]