30 days guarantee

SSL247 Blog

<< Newer articles 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |

Get in touch now

 

Another satisfied customer

More info
Register your Domain Name
  • Bulk transfer domains
  • Register 400+ domain extensions
  • Free DNS management
  • Industry leading grace and redemption periods
  • No hidden fees

Facebook launches new tool that detects rogue certificates

Facebook has developed and implemented a new tool that allows domain name owners to reveal SSL certificates that were issued without their awareness. Facebook’s new tool facilitates certificate transparency monitoring to help domain administrators; the pioneering tool empowers users to set up automatic alerts when any certificates are issued for domains.

Read the rest of this entry...

Share this:

What cyber threats should businesses watch out for in 2017?

Last year cyber security became more prevalent and widespread in popular media than it ever has been before. Tesco Bank, the Democratic Party and Three Mobile are just a few of the publicised victims of the malicious hacks of 2016. We now begin to examine the potential threats of 2017.

Read the rest of this entry...

Share this:

Encryption and Human Rights

Earlier this year – in April - messaging service WhatsApp announced that it would implement end to end encryption to its communication. Now FaceTime, Facebook and iMessage have followed suit. However, this movement has not been well received by everyone, namely Government officials who need to gain access to data from likely criminal contenders. It can be argued that this threatens the sanctity of the right to freedom of expression and right to privacy. The lines are blurred between what’s ethical and what’s not. To what extent is a government official right in “snooping” around the private messages of a suspicious individual?

Read the rest of this entry...

Share this:

Encryption and Human Rights

Earlier this year – in April - messaging service WhatsApp announced that it would implement end to end encryption to its communication. Now FaceTime, Facebook and iMessage have followed suit. However, this movement has not been well received by everyone, namely Government officials who need to gain access to data from likely criminal contenders. It can be argued that this threatens the sanctity of the right to freedom of expression and right to privacy. The lines are blurred between what’s ethical and what’s not. To what extent is a government official right in “snooping” around the private messages of a suspicious individual?

Read the rest of this entry...

Share this:

Yes, it's SHA-ppening: Transition to SHA-2

There’s been increasing evidence as to why it’s best to migrate to SHA2 by the end of this year. SHA-1 (Secure Hash Algorithm) has been deemed insecure and faulty as researchers determined that it’s easier to break the encryption and evidently easier for hackers to retrieve personal data such as passwords and bank accounts.

Read the rest of this entry...

Share this:

A data leak a day keeps the Doctor's patients away

It’s no secret that healthcare is one of the most susceptible industries to cyber-attacks. Last week extensive research from Sky News revealed that 7 NHS trusts have been putting their 2 million patients’ data in danger and ultimately in the hands of cyber criminals.

Read the rest of this entry...

Share this:

Gone in 60 seconds

It was reported that the new Google Pixel, arguably the most sophisticated smartphone and dubbed “the best alternative to the iPhone, was hacked by a group of Chinese white hat hackers in less than a minute. The hack took place at the PwnFest hacking competition in Seoul and Qihoo 360 took home a handsome sum indeed: $520,000.

Read the rest of this entry...

Share this:

Preventing "Little Hackers"

Last year it was reported by the that the average age of a hacker was just 17 years old. This number shouldn’t be so alarming when we know that Generation Z was born in the heart of digital age, have had the internet readily available to them; and are more tech savvy than their millennial cohorts.

So, what actions will be undertaken to stop children from entering the cyber crime sphere? The National Crime Agency plans to set up a campaign to help protect and prevent children as young as 12 from carrying out attacks and other cybercrime activities. The Director of the National Cyber Crime Unit, Dr. Jamie Saunders, at the NCA proposed the initiative to be called ‘Cyber Prevent’. The movement is primarily aimed at parents who are unaware of what their children are getting up to online.

Read the rest of this entry...

Share this:

Cyber Security Trends to Watch: Part 2

2017 will beckon more cyber-attacks to into the Industrial Internet of Things. The sheer quantity of IT and Operational Technology is making the infrastructure more susceptible to these cyber-attacks. Anticipate these threats more carefully with our various types of professional Penetration Testing

Read the rest of this entry...

Share this:

How does GDPR affect IT professionals?

In light of rising data consumption, GDPR will be enforced in May 2018 and will be more rigorous than the Data Protection Act of 1998. The aim of GDPR is to reinforce data protection for EU citizens. It applies to “personal data” such as IP addresses and “sensitive personal data” So, how does it affect IT professionals?

Read the rest of this entry...

Share this:
<< Newer articles | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |

Symantec

Norton seals are viewed more than half a billion times a day on more than 100,000 websites in 170 countries and in search results on enabled browsers, as well as partner shopping sites and product review pages. When website visitors see the Norton Trust Seal, they are less likely to abandon a transaction and more likely to do business with you online.

SSL Certificates

Our Partnerships
Our Accreditations
Our Trust Seal
Sitemap | Cookies | Legal
© 2016 . All rights reserved. SSL247 SARL is registered at Registre du Commerce in Roubaix-Tourcoing - RCS 508308 079. | Tel: 1-800-511-9176

Cookies SSL247 uses cookies to provide you a seamless user experience. For more information please read our Terms & conditions. Continue