The SSL 3.0 vulnerability stems from the way blocks of data are encrypted under a specific type of encryption algorithm within the SSL protocol. The POODLE attack takes advantage of the protocol version negotiation feature built into SSL/TLS to force the use of SSL 3.0 and then leverages this new vulnerability to decrypt select content ... Read More »
If you haven’t done it yet, it’s officially time to get your site more secure. As of this past Wednesday, Google is motivating websites to become secure and is using its search engine results’ ranking as incentive. In a recent blog post by Zineb Ait Bahajji and Gary Illyes, Webmaster Trends analysts for Google, they announced ... Read More »
Google Gmail application for iOS is exposed to risks of a Man-in-the-Middle attack which allow bad actors to monitor encrypted email communcations. A security expert at mobile security firm Lacoon has discovered that the version of Gmail for iOS based mobile device does not perform the certificate pinning procedure when ... Read More »
Insufficient web hosting security has been a subject of concern lately as successful online security breaches, like the widely publicized HeartBleed bug, have made waves across the media. Hackers are becoming increasingly advanced, and small businesses and major corporations alike are the prized targets of hackers aiming to exploit sensitive data. ... Read More »
