Blog Support

SSLTrust Cyber Security Blog | Page 5

Back to Blog Homepage
#Articles

Understanding the SSL/TLS Racoon Attack

It’s that time again. As protocols mature, inevitably security vulnerabilities lurking beneath the surface are uncovered by security professionals. The so-called “Racoon” vulnerability is unusual however in that it affects TLS 1.2, arguably the most …

#Articles

Understanding Certificate Cross-Signing

Certificate Cross-Signing is a nuance of PKI which is often poorly understood. This topic is particularly salient as of late, as a long-lived root certificate managed by Sectigo (formerly Comodo) expired, causing many unexpected problems for many …

#News

Let’s Encrypt Revokes 3 Million Certificates

On Friday February 28th, Let’s Encrypt made the tough decision to revoke over 3 million certificates they had issued due to a bug in the software they use to validate CAA records. This gave companies relying on Let’s Encrypt under a week to replace …

#Articles

Zero-Day Vulnerabilities and its Impact on Business

Computer System Vulnerabilities are a serious security issue that can find its way to our computers through harmless browsing activities. This can be as simple as visiting a website, clicking on a compromised message or downloading software with …

#Articles

My Account may have been Hacked - What should I do

It can feel like a nightmare when you can’t login to your email account or you start to notice some unfamiliar activity occurring on your profile that you know wasn’t caused by you. It’s important to always pay attention to any suspicious activity …

#Guides

How to Determine if a Website is Fake or Fraudulent

You should never visit any website that you feel may be fake or fraudulent, because you could be putting your computer and all of your personal information at risk. Always look closely at the content on any website you visit because it can be …

#Guides

The Quick and Easy Guide to PCI Compliance

PCI DSS stands for Payment Card Industry Data Security Standard, which sets the requirements for organizations and sellers to safely and securely accept, store, process, and transmit cardholder data during credit card transactions to prevent fraud …