If you’ve not updated Google Chrome to Google Chrome 56 you could click on the green padlock to view the details of the SSL certificate. The new version of Google, Chrome 56, camouflages all the SSL certificate details if you click the padlock.
With just under week to go, we’re gearing up to participate at the FIC exhibition, the international hub of cybersecurity. We’ve participated in many exhibitions and events before but we’re happy to make our debut at FIC on the 24th of Jan.
Facebook has developed and implemented a new tool that allows domain name owners to reveal SSL certificates that were issued without their awareness. Facebook’s new tool facilitates certificate transparency monitoring to help domain administrators; the pioneering tool empowers users to set up automatic alerts when any certificates are issued for domains.
This year cyber security became more prevalent and widespread in popular media than it ever has been before. Tesco Bank, the Democratic Party and Three Mobile are just a few of the publicised victims of the malicious hacks of 2016. As 2016 comes to a close we begin to examine the potential threats of 2017.
Earlier this year – in April - messaging service WhatsApp announced that it would implement end to end encryption to its communication. Now FaceTime, Facebook and iMessage have followed suit. However, this movement has not been well received by everyone, namely Government officials who need to gain access to data from likely criminal contenders. It can be argued that this threatens the sanctity of the right to freedom of expression and right to privacy. The lines are blurred between what’s ethical and what’s not. To what extent is a government official right in “snooping” around the private messages of a suspicious individual?
There’s been increasing evidence as to why it’s best to migrate to SHA2 by the end of this year. SHA-1 (Secure Hash Algorithm) has been deemed insecure and faulty as researchers determined that it’s easier to break the encryption and evidently easier for hackers to retrieve personal data such as passwords and bank accounts.