Blog Support
SSLTrust

SSLTrust Cyber Security Blog #Articles

Page 3
#Articles

Encryption vs Hashing: What’s the difference?

Both Encryption and Hashing are fundamental building blocks of cryptosystems. When it comes to best practices for storing credentials in your application however, best practice is largely driven by what you’re trying to do. There are a lot of …

#Articles

Rehashing Hashing: What is SHA-256?

Next to encryption, hashing is perhaps the most important building block of modern cryptosystems. But what is a hash? Why is it important? How can some ways of computing a hash be better than others, and what makes a particular method suitable for …

#Articles

What and how strong is 256-bit Encryption?

It is a peculiar thing to see, but more and more commonly terms of art make their way into the mainstream media. It seems that every week a new article about a vulnerability, cyberattack, or data breach makes its way into public discourse. One …

#Articles

SSL/TLS and captive portals

Chances are that you’ve used a captive portal – possibly without knowing it! Captive Portals are a legitimate means of grabbing the users attention

#Articles

Understanding the SSL/TLS Racoon Attack

It’s that time again. As protocols mature, inevitably security vulnerabilities lurking beneath the surface are uncovered by security professionals. The so-called “Racoon” vulnerability is unusual however in that it affects TLS 1.2, arguably the most …

#Articles

Understanding Certificate Cross-Signing (Cross Signature)

In this article, we’ll discuss cross-signing (cross signature) and its role in SSL/TLS cert signing. We’ll explain the benefits of CA choosing to sign cert chains using multiple root certificates while also covering the potential pitfalls when …

#Articles

Zero-Day Vulnerabilities and its Impact on Business

Computer System Vulnerabilities are a serious security issue that can find its way to our computers through harmless browsing activities. This can be as simple as visiting a website, clicking on a compromised message or downloading software with …

#Articles

My Account may have been Hacked - What should I do

It can feel like a nightmare when you can’t login to your email account or you start to notice some unfamiliar activity occurring on your profile that you know wasn’t caused by you. It’s important to always pay attention to any suspicious activity …

You may be also interested in reading our other resources...

Learning Centre

View more resources on cyber security, encryption and the internet.

Helpful Guides

View more Guides, FAQs and information to help with your Certificate purchases.