certificates
![shop online](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105902/shop-online-400x200.jpg)
Explosion of look-alike domains aims to steal sensitive data from online shoppers
Venafi released research on the explosion of look-alike domains, which are routinely used to steal sensitive data from online shoppers. Venafi’s research analyzed suspicious …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100900/key-400x200.jpg)
Organizations apply stronger PKI security controls due to their increasingly critical role
The Internet of Things is the fastest growing trend driving the deployment of applications that use public key infrastructure as evidenced by the Thales 2018 Global PKI Trends …
![Windows certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100709/windows-certificate-400x200.jpg)
Underground vendors can reliably obtain code signing certificates from CAs
More and more malware authors are switching to buying new, valid code signing certificates issued by Certificate Authorities instead of using stolen (compromised) ones, …
![Qualys CertView](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100951/qualys-certview-400x200.jpg)
Make certificate visibility and security a part of your overall security program
In this podcast recorded at RSA Conference 2018, Asif Karel, Director of Product Management at Qualys, illustrates why certificate visibility and security should not just be …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Counterfeit digital certificates for sale on underground forums
Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware won’t be flagged by antivirus solutions and …
![reddit bad](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101919/reddit-bad-400x200.jpg)
Realistic, well-positioned Reddit clone is out to grab users’ login credentials
A convincing clone of the popular social news aggregation and discussion site Reddit has been spotted on the reddit.co domain. The author is obviously counting on users not to …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
Microsoft plugs 56 vulns, including Office flaw exploited in attacks
As part of the January 2018 Patch Tuesday, Microsoft has released fixes for 56 CVE-listed vulnerabilities, including the Meltdown and Spectre flaws, and an Office bug actively …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105147/certificate-400x200.jpg)
How much do criminals pay for certificates on the dark web?
The Cyber Security Research Institute (CSRI) conducted a six-month investigation into the sale of digital code signing certificates on the dark web. The research uncovered …
![https](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103810/https-400x200.jpg)
Making HTTPS phishing sites easier to spot
For years, we taught users that a website’s URL that includes https at its very beginning is a relatively good indicator of whether they can safely input sensitive …
![Symantec](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104654/symantec-400x200.jpg)
Google to sanction Symantec for misissuing security certificates
In a post on a developers’ forum, software engineer on the Google Chrome team Ryan Sleevi has announced Google’s plan to start gradually distrust all existing …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112340/lock-400x200.jpg)
Automating PKI for the IoT platform
In this podcast recorded at RSA Conference 2017, Jeremy Rowley, Executive VP of Emerging Markets at DigiCert, talks about automating PKI for IoT platform and building scalable …
![structure](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103902/structure-red-400x200.jpeg)
New attack sounds death knell for widely used SHA-1 crypto hash function
SHA-1 is definitely, provenly dead, as a group of researchers from CWI Institute in Amsterdam and Google have demonstrated the first practical technique for generating a …