The biggest hurdle for implementing DANE lies with DNSSEC. Granted, setting up DNSSEC can be daunting, but the reward of a much higher level of DNS security can make it worth the effort.
Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.
A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
Digital certificates are used to authenticate both sides of a browser connection. It's a good first step, but certificates do not assure absolute trust.
The open source FreeRADIUS project recently patched a vulnerability that allowed malicious actors to bypass session authentication.
Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.
Web browsers are moving away from SHA-1 digital certificates, and organizations need to make sure they are in line with more secure measures.
Identifying a revoked TLS certificate is impossible for versions of PHP, Python or similar languages because of faults in their underlying libraries.
Shifting to HTTPS is vital for websites, but many organizations are not implementing it properly and leave users at risk as a result.
Google's Gmail now alerts users when they receive unsecured, unencrypted and unauthenticated emails in an attempt to increase security awareness.