Malware distributors are adopting cloud computing, either by buying services directly or by compromising legitimate accounts, as a quick and cost-effective way to bring their malware online, according to a new report. Major hosting providers such as Amazon and GoDaddy (which host 16 percent and a 14 percent of malware, respectively) can also help ... Read More »
Encryption key management for SSL is the process of successfully securing and managing the private key. The private key is the tool that is used to decrypt the information that is received from anyone who has access to the public key. For example if an end-user purchases an item from amazon.com their browser would encrypt the personal information ... Read More »
As many of you may know Google recently detected a TLS/SSL certificate that was created by the Ministry of France and used as “a commercial device, on a private network, to inspect encrypted traffic with the knowledge of the end users.” In general there is no application on the public internet that would require such a certificate and ... Read More »
As allegations against RSA and its parent company EMC have grown over the past couple of months many of the conference keynote speakers have decided to withdraw from giving their speeches. The controversy began after Edward Snowden leaked documents about the secret methods of the NSA, one of which was that the NSA paid nearly $10 Million dollars ... Read More »
