Blog Posts Tagged with "Comodo"
April 08, 2012 Added by:Rafal Los
We've seen a few of the largest CAs get compromised and fake certificates end up in the hands of nation-states which wanted to spy on their population. It goes without saying that there are likely more attacks that we've simply either not picked up or were unreported...
January 03, 2012 Added by:Headlines
As 2011 was such an eventful year where security is concerned, no doubt many readers will point to numerous instances where they feel an episode was overlooked that should have been included in the top ten - but hey, you have to draw the line somewhere...
January 03, 2012 Added by:Electronic Frontier Foundation
At EFF we are big fans of HTTPS, the secure version of HTTP that allows for private conversations between websites and users who are browsing them. Though we've known that this system has been flawed for a while now, last year there were two attacks that acutely demonstrated just how brittle it is...
September 13, 2011 Added by:Headlines
“I’m able to issue Windows updates... I already reversed ENTIRE Windows update protocol, how it reads XMLs via SSL, which includes URL, KB no, SHA-1 hash of file for each update, how it verifies that downloaded file is signed using WinVerifyTrust API..."
September 12, 2011 Added by:Rafal Los
When the very authority that helps your computer systems identify who to trust is compromised... who or what is there left to trust? I don't mean to sound alarmist, but if even half the claims this black hat hacker are making are true, we have a severe Defcon 1-style problem on our hands...
September 08, 2011 Added by:Headlines
"The attack on Diginotar doesn't rival Stuxnet in terms of sophistication or coordination. However, the consequences of the attack on Diginotar will far outweigh those of Stuxnet. The attack on Diginotar will put cyberwar on or near the top of the political agenda of Western governments..."
April 11, 2011 Added by:Headlines
“Right now, it's just an illusion of security. Depending on what you think your threat is, you can trust it on varying levels, but fundamentally, it has some pretty serious problems..."
March 28, 2011 Added by:Headlines
The supposed lone-hacker now claiming responsibility, who dubbed him or herself "Comodohacker", said in their statement that the attack on Comodo was in retaliation for the release of the Stuxnet virus that damaged equipment at Iran's Natanz uranium enrichment facility...
March 24, 2011 Added by:Headlines
"We believe these are politically motivated, state-driven/funded attacks. One of the origins of the attack that we experienced is from Iran. What is being obtained would enable the perpetrator to intercept Web-based email/communication," said Melih Abdulhayoglu, the CEO and founder of Comodo...
Bridging the Cybersecurity Divide, Why Secur... leijon 19 on 02-28-2015
Seven “Sins” of Cyber Security... Andrew David on 02-28-2015
Today's Mobile Device Data Protection Must G... leijon 19 on 02-28-2015