October 20, 2015 Chrome Chameleon: New Browser Malware Hides in Plain Sight 2 min read - A new Chrome malware doesn't just infect browsers — it replaces them with identical copies. Here's how to spot it before becoming a victim.
October 15, 2015 Duped Digital Certificates: Major CAs Accused of Fueling Fraudsters 2 min read - CAs aren't keeping up their end of the bargain: According to Netcraft, many have been issuing digital certificates to scam websites.
September 17, 2015 Three-Week Malvertising Campaign Exposes Security Holes in Online Ad Process 2 min read - Researchers recently discovered a malvertising campaign that ran undetected for weeks, calling attention to the need for stricter online ad security.
September 3, 2015 Why the Browser Industry Is Collectively Saying Goodbye to RC4 Next Year 2 min read - Security-conscious browsers are planning to say goodbye to the RC4 algorithm by February 2016 in favor of more advanced encryption methods.
August 25, 2015 Amazon to Disable Flash Player in Hosted Ads 2 min read - Amazon is prohibiting ads using Flash Player for its site, which may be the final straw for organizations concerned about ongoing security risks.
May 21, 2015 Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers 2 min read - Researchers say the Logjam flaw could fool Web browsers and servers into using weak encryption keys, allowing cybercriminals to intercept and decode data.
May 11, 2015 Google Research Suggests Ad Injectors Could Be Stealing Data 2 min read - Google has discovered more than 84,000 ad injectors placing unwanted software on websites, which isn't merely an annoyance but a major security risk.
May 8, 2015 Apple Security Updates Shake Bugs Out of Safari’s Tree 2 min read - New Apple security updates target a number of critical bugs in the Safari browser, specifically those exploiting its open-source WebKit.
December 10, 2014 Major Websites Remain Vulnerable to POODLE Attack 3 min read - Many major websites are still vulnerable to the POODLE attack, which now works against certain Transport Layer Security (TLS) implementations.