BLOG ARCHIVE

Update on POODLE SSL 3.0 Vulnerability

Similar to the previous POODLE vulnerability we wrote about two months ago is back and this time, it has the ability to affect even the newest version of the protocol. The new vulnerability is only estimated to affect under 10% of servers. The current POODLE attack can be executed with… Read More

Microsoft Releases Patch For Dangerous SSL Vulnerability

Perhaps the most commonly known vulnerability of the year was the Heartbleed bug which exploited SSL’s in browsers everywhere. Microsoft may have a similar issue on their hands and has released a patch through Windows Update. This update is extremely critical for anyone using Windows and should be updated as… Read More

How Do I Know If I Am On a Secure Site?

In this day and age internet security is extremely important to users. Because there are many ways for your information to be stolen, secure websites are the only way to safely submit information online. A secure website facilitates a safe connection between a website and the web browser in order to protect… Read More

What is SHA-2 and how does it affect me?

First, let’s understand what SHA-1 does. Both SHA-1 and its successor, SHA-2, are specific types of signing algorithms. Signing algorithms are used as part of the identity validation role that SSL certificates perform. They are mathematical functions (referred to as a “hash”) which, when performed, should calculate a persistent and… Read More

Transitioning from SHA-1 to SHA-2

The transition from SHA-1 to SHA-2 (Secure Hash Algorithm) is coming soon. On November 7th, 2014, Google Chrome will stop displaying the security indicators such as the green padlock and/or green address bar for any certificates using the now outdated SHA-1 algorithm. Luckily, there is a FREE and easy way… Read More

Contact to get a head start

Email Us Call » 858.368.4545

  • Designed by RedOrum