Filter Blogs expand_more
Blog add
Authors add
10 Results for 'compromise'
Blog

By Jason Soroko

September 26, 2014

Security experts discovered a bug in Bash — which has been named “Shellshock” — that could be used to compromise systems that utilize the Bash shell. The bug dates back to Version 1.13. Bourne-Again Shell, or Bash, is software that is built into nearly 70 percent of machines connected to the Internet. Bash has been widely used for the GNU operating system, as well as a default shell on Linux since 1989. It is also extensively used as the GNU shell for Mac OS X. Learn more. 
Blog

By Bruce Morton

February 06, 2017

Code Signing is a cryptographic process to digitally sign executables and scripts. The signature confirms the software author or publisher’s identity, and provides integrity by guarantying the software has not been altered since it was signed. Minimum Requirements for Code Signing will increase Internet security by setting a new bar to prevent private keys from being compromised. The requirements will also provide a better mechanism to have code signing certificates revoked limiting the proliferation of malware. The result will benefit application software suppliers, online businesses, and of course, software users globally.
Blog

By Bruce Morton

April 17, 2013

Are your secure SSL communications being compromised by a man-in-the-middle (MITM) attack?
Blog

By Entrust Datacard

August 16, 2013

When a company decides to mobilize, it often allows many of its central processes to be governed by remote devices apart from its central server. This often goes beyond basic email and contact lists and includes important corporate applications that, if compromised, could lead to devastating organizational consequences.
Blog

By Mike Byrnes

January 19, 2015

The digital world is constantly evolving. More organizations are using mobile, cloud and social media solutions as vessels to connect and communicate with their employees, customers and citizens. Social media platforms such as Twitter, YouTube and LinkedIn provide real-time channels to communicate our news, views and also can be a critical tool for public safety used to inform the public. Last week, the announcement of an attack on US Central Command (CentCom) social media accounts made headlines.
Blog

By Entrust Datacard

August 24, 2015

For many, SSL certificates are synonymous with data encryption for the Internet. The technology — which secure Web sessions for users through the secure sockets layer protocol — is widely deployed by organizations that offer e-commerce and other services. After all, when it comes to e-commerce in particular, the arena is highly vulnerable. These days, there are many examples of such platforms that have been compromised, putting customers at risk. This blog covers some examples and recommendations.
Blog

By Bruce Morton

December 22, 2015

On January 1, 2016, the public trust certification authorities (CAs) will stop issuing SHA-1 signed SSL/TLS certificates. The bottom line is SHA-1 is vulnerable. New studies have shown that the safety factor is decreasing. Continuing to issue SHA-1 signed certificates could compromise a CA or could compromise a legitimate website. Unfortunately for old browser and operating users, the servers must continue to move to SHA-2 signed certificates. These users should try to move to supported systems.
Blog

By Entrust Datacard

March 16, 2015

Last year was a nightmare when it came to businesses and cybersecurity. Seemingly every few days, a big new breach popped up — one that compromised patron data, blemished a business' reputation and generally left customers with an uneasy feeling about the security of their personal information. This year, companies out there have two basic options when it comes to securing their infrastructure. 
Blog

By Stephen Demone

October 11, 2016

“Heartbleed Bug”. “Poodle”. “Sea-Surf”. “DROWN”. If these were super villain names, I wouldn’t exactly be sending in Superman to deal with these guys. But, don’t let these catchy names fool you - these are the names of serious cyber-attacks that resulted in millions of people’s data being exposed and financial information compromised. 
Blog

By Entrust Datacard

April 02, 2014

Entrust president explains how businesses can guard customer Identities In any situation where security is compromised, it helps to hear from experts whose job it is to make sure businesses have a strong authentication infrastructure in place. 
Page 1 of 1