Welcome to this March edition of SSL.com’s Security Roundup! Things have changed a lot over the past month, as we are all well aware, but with more time being spent online, there is plenty of news about SSL/TLS, digital certificates, and network security. This » Continue Reading.
It’s hard to develop bug-free code on the first try, so developers need the freedom to experiment and break things before going live. Whether you’re developing certificate automation solutions with SSL.com’s RESTful SWS API or just learning to work with teams and orders in » Continue Reading.
For the convenience of users and developers, SSL.com maintains a Sandbox testing instance, a clone of our production release of the SSL.com portal and SWS API. The Sandbox is like a “lab,” where you can freely experiment with SSL.com’s services with no fear of breaking » Continue Reading.
With so many people currently working and studying from home, phishing is becoming a bigger problem every day. Phishing scams try to trick you into giving up sensitive personal information and/or install malware on your devices via fake email messages and websites. Sadly, some » Continue Reading.
For many of us, the idea of preventing a cyberattack or avoiding malware can be stress-inducing. After all, though most of us now live increasingly online, few of us have formal training on the subject. But one of the most common types of attacks, » Continue Reading.
You already know that cybercriminals are out there trying to steal your passwords and credit card numbers, and that you need to be careful when shopping, banking, and interacting with organizations like your school or employer online. With so many people now working and studying » Continue Reading.
As you probably already know, the web has no shortage of cybercriminals out to steal your money and/or identity. You may have gotten a taste yourself — a little over a year ago I had to deal with a bill of over $700 for » Continue Reading.
Source: Centers for Disease Control and Prevention Phishing is a malignant curse and the evil chuds behind phishing campaigns are always seeking a new angle of attack. As worry about COVID-19’s spread increases, and as more people start working and studying from home, we can » Continue Reading.
You can use OpenSSL to show proof-of-possession (POP) of a private key by signing a test file with it. This method works for both RSA and ECC keys. What is OpenSSL? OpenSSL is a very useful open-source command-line toolkit for working with X.509 certificates, certificate » Continue Reading.
If securing the Internet of Things (IoT) was simple and straightforward, we wouldn’t be reading high-profile stories each week about routers with exposed private keys and breached home security cameras. With news like this, it’s no wonder that many consumers are still suspicious of » Continue Reading.