The World’s Most Destructive Viruses

The world of computer viruses has changed drastically over the last 25 or so years. In the early days, internet users were very naïve towards email attachments, contributing to the alarming speed that viruses could spread across the globe.

These days, viruses very rarely land in our inboxes due to preconfigured firewalls and strict measures from the likes of Gmail and Outlook.

Read more

Small Business Internet Security Planner 2015

We feel immensely proud when we consider all the wonderful sites out there that are protected by our SSL certificates, but obviously SSL certificates are just one part of the cyber security puzzle.

So we thought we’d try and give our customers a helpful overview of the wider picture. There’s some great in-depth guides out there already, but we wanted to create something slightly different.

Read more

39-Month Maximum SSL Validity Period

In a previous blog post we reported that Google and Microsoft are encouraging Certification Authorities (CAs) to depreciate the vulnerable and outdated SHA-1 cryptographic algorithm and move to the stronger SHA-2.

Starting January 1, 2016, CAs must not issue any new SSL certificates using the SHA-1 hash algorithm. CAs may continue to sign certificates to verify OCSP responses using SHA-1 until January 1, 2017. This year also began with an important update.

Read more

Cyber Security in 2015

No one was immune to the impact of cyber criminal activities in 2014. It will be remembered as the year of the Heartbleed bug that caused a vulnerability in the popular OpenSSL cryptographic library; the Poodle attack against outdated SSL 3.0; the sunset of the SHA-1 cryptographic algorithm, which was frequently affected by cyber attacks; and the Shellshock software bug.

Many e-commerce giants, popular smartphone applications, and government and health organizations were also actively attacked by hackers in 2014.

Read more