Getting to Know AMT SSL

As many of us know businesses are increasingly using Active Management Technology (AMT) to remotely control and manage their computer networks. In response to this increase in AMT technology some Certificate Authorities including Comodo have released new AMT SSL certificates that are designed specifically for the remote configuration of Intel vPro ... Read More »

11th Feb 2014
Top 5 Ways to Keep Your Personal Information Private

Since the Edward Snowden leaks internet privacy has become somewhat of a difficult subject to discuss. It has come to light that the NSA along with the other agencies (FBI, CIA etc.) have access to our personal lives, which in return has given us a big brother sense of insecurity. In order regain that sense of security we lost months ago I will ... Read More »

4th Feb 2014
Demystifying Point of Sale Malware and Attacks

Cybercriminals have an insatiable thirst for credit card data. There are multiple ways to steal this information on-line, but Point of Sales are the most tempting target. An estimated 60% of purchases at retailers’ Point of Sale (POS) are paid for using a credit or debit card. Given that large retailers may process thousands of ... Read More »

3rd Feb 2014
Why We Need to Move to SHA-2

Previously, we advised that the SSL industry must move to the SHA-2 hashing algorithm for certificate signatures. We thought it would be helpful to provide the reasoning behind the position. In the context of SSL, the purpose of a hashing algorithm is to reduce a message (e.g., a certificate) to a reasonable size for use with a digital signature ... Read More »

30th Jan 2014
4 5 6 7 8