Blog Support
SSLTrust

SSLTrust Cyber Security Blog #Articles

Page 3
#Articles

Understanding Certificate Cross-Signing

Certificate Cross-Signing is a nuance of PKI which is often poorly understood. This topic is particularly salient as of late, as a long-lived root certificate managed by Sectigo (formerly Comodo) expired, causing many unexpected problems for many …

#Articles

Zero-Day Vulnerabilities and its Impact on Business

Computer System Vulnerabilities are a serious security issue that can find its way to our computers through harmless browsing activities. This can be as simple as visiting a website, clicking on a compromised message or downloading software with …

#Articles

My Account may have been Hacked - What should I do

It can feel like a nightmare when you can’t login to your email account or you start to notice some unfamiliar activity occurring on your profile that you know wasn’t caused by you. It’s important to always pay attention to any suspicious activity …

#Articles

Route Poisoning: Why we need SSL/TLS

SSL/TLS is the bedrock of modern security. Just about all security strategies involve it or chain back to it at some point. At its core, the contract is this: something encrypted with a user’s public key can only be decrypted by the corresponding …

#Articles

Google Chrome 68 Released, Marking insecure websites

In the recent past, web security has undergone a series of upgrade to more secure strategies advocating the use of HTTPS encryption features. In November 2017, Google announced that they will implement some changes in their Chrome web browser. True …

You may be also interested in reading our other resources...

Learning Center

View more resources on cyber security, encryption and the internet.

Helpful Guides

View more Guides, FAQs and information to help with your Certificate purchases.