- March 12, 2024
- Iris Jennifer Jo
Understanding Digital Connections: SSL in Hong Kong
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of…
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious…
In my last post, I suggested that PKI might be the answer to securing the Internet of Things (IoT) - it's an established standard and offers the authentication, encryption, and data integrity needed…
OpenSSL released updated versions of its software with patches to fix various vulnerabilities including one that could allow an attacker to perform a denial-of-service attack against a server running…
GlobalSign’s successful completion of the North American Energy Standards Board (NAESB) Authorized Certification Authority accreditation audit.
Last week the White House’s web team announced that it was enabling HTTPS by default, also known as Always On SSL (AOSSL). The FTC did the same thing a week before that. AOSSL isn’t a new concept for…
FREAK is a new man-in-the-middle (MITM) vulnerability discovered by a group of cryptographers at INRIA, Microsoft Research and IMDEA. FREAK stands for “Factoring RSA-EXPORT Keys.” The vulnerability…
As stated by the CA/B Forum, no later than 1 April 2015, certificates must be limited to a maximum validity of 39 months.
t's great to see the abundance of cyber and information security discussion and activity by regulators of late. Particularly in January, the FTC released a report providing guidance to business for…
System integrator Avisi enables multi-factor authentication for Dutch notaries when accessing KNB platform
It's clear digital certificates can be a great option for your security projects (e.g., authentication, digital signatures, secure email), but once you've decided on a certificate-based solution, you…
Lenovo enables man-in-the-middle attacks via Superfish Adware- find out how!
It seems you can't go a day without hearing about the Internet of Things (IoT). While there's no questioning the scale and impact it's going to have on our life as we know it, there is one major…
With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015
Everyone's talking about the Sony megahack, and for good reason. The sheer amount of data (up to 11 TB), and the contents (passwords, employee social security numbers, corporate secrets, emails) have…
When we first reported on the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability in October, it was believed to only affect the SSLv3 protocol. However, the vulnerability, which…
Tackling some digital signature and S/MIME FAQs, including what happens to encrypted emails after the certificate expires, how to streamline public key exchange, and how PDF and Office digital…