#certificate-authorities

[ follow ]

Stop using Entrust for your BIMI Certificates

Entrust's certifications will become invalid for Apple after November 15, 2024, necessitating urgent migrations to other trusted providers.
Both Google and Apple have cut ties with Entrust over trust violations, raising urgent issues for users relying on Entrust certificates.
#internet-security

What Entrust certificate distrust means for developers

Google's Chrome will not trust new server authentication certificates from Entrust due to compliance issues, impacting internet security.

What Is an SSL Certificate? Definition and Guide (2023) - Shopify

SSL certificates enhance online security by encrypting data, protecting identities, and ensuring safe web communication.

What Entrust certificate distrust means for developers

Google's Chrome will not trust new server authentication certificates from Entrust due to compliance issues, impacting internet security.

What Is an SSL Certificate? Definition and Guide (2023) - Shopify

SSL certificates enhance online security by encrypting data, protecting identities, and ensuring safe web communication.
moreinternet-security
#cybersecurity

Google calls for halting use of WHOIS for TLS domain verifications

Threat actors can exploit WHOIS data verification to fraudulently obtain TLS certificates, prompting calls for a reevaluation of verification practices.

How researchers paid $20 and undermined internet integrity

Researchers found a vulnerability in the WHOIS protocol that could undermine certificate authorities and expose systems to potential exploitation.
The migration of WHOIS servers can leave expired domains vulnerable to exploitation, posing security risks for millions of systems.

Google calls for halting use of WHOIS for TLS domain verifications

Threat actors can exploit WHOIS data verification to fraudulently obtain TLS certificates, prompting calls for a reevaluation of verification practices.

How researchers paid $20 and undermined internet integrity

Researchers found a vulnerability in the WHOIS protocol that could undermine certificate authorities and expose systems to potential exploitation.
The migration of WHOIS servers can leave expired domains vulnerable to exploitation, posing security risks for millions of systems.
morecybersecurity
[ Load more ]