Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Website Security Solutions
Showing posts tagged with Code Signing
Showing posts in English
Tim Callan | 20 Sep 2010 | 0 comments

On the heels of the recent massive malware attack appearing on sites hosted by Network Solutions, today saw a similar mass malware attack on Go Daddy hosted sites. No, you're not experiencing deja vu. Go Daddy had a malware problem very like this one earlier in the year.

This latest incident once again highlights the need for automated web site malware scanning. Daily malware distribution scanning gives small businesses an early warning that they're under attack before they unwittingly distribute malware to their...

Tim Callan | 15 Sep 2010 | 0 comments

This new video goes over recent results of eyeball tracking testing to measure the attention shift when the VeriSign seal appears in your search results using our new Seal-in-Search capability. I presented this information at the recent Search Engine Strategies expo in San Francisco.

Tim Callan | 13 Sep 2010 | 2 comments

On September 16 Microsoft will grant software developers access to the Windows Phone 7 application platform developer tools, freeing them to develop for the Windows Phone 7 Marketplace. Windows Phone 7 is scheduled for launch in the upcoming holiday season.

That's good news for developers, who will have a direct channel to sell their applications to Windows Phone users, in a time when mobile application downloads are rising meteorically and the mobile computing ecosystem is on a massive growth spurt. To wit,

Tim Callan | 10 Sep 2010 | 0 comments

A new malware attack made the press yesterday by exploiting vulnerability in the Adobe Acrobat platform to circumvent Windows defenses. Like other recent attacks, this malware was signed using a compromised certificate. Symantec found out about this attack on Wednesday afternoon. On Wednesday we contacted the customer to inform them of the compromised certificate and revoked the certificate.

The original blog entry that revealed the attack is here. The attack was covered in The Tech Herald here.

Tim Callan | 09 Sep 2010 | 0 comments

In the next month the Symantec SSL business will be participating in these events.

The week of September 20 I'll be in attendance at the Online Trust Alliance's Online Trust and Cybersecurity Forum in Washington D.C. This forum will be chock full of key players from private industry and government alike. We'll be discussing the initiatives needed to ensure that our online systems continue to be secure and trustworthy in the landscape of constantly evolving threats. I'm fortunate enough to be moderating a panel on Thursday. If you're attending the forum, please come to my panel and ask a question or two. If you're not registered yet, better do it soon. There are still a few seats left, but don't waste time.

The next week we'll be exhibiting at Search Marketing Expo in New York City. Our...

Tim Callan | 23 Aug 2010 | 1 comment

That's right, you're reading my 400th post. With few exceptions I don't tend to get introspective about this blog on this blog, so I'll keep this entry short and sweet.

I wrote my first post on March 25, 2006, which means that I wrote one post approximately every four days. And while I always get a lot of attention for my SSL poetry, I see that I've only actually published SSL poems on four occasions, an average of one every 394 days. I'll try to be better about that.

Tim Callan | 17 Aug 2010 | 0 comments

A recent New York Times article discusses the concerns held by online civil rights groups that oppressive governments around the world might work with certificate authorities (CAs) through either coercion or willing partnership to compromise the integrity of private and/or corporate online communications.

The article points out that proliferation of CAs around the world means that the world's browser and device vendors have given the tremendous responsibility of issuing certificates to a very broad variety of organizations. Given that the conduct of these CAs is not policed to any effective degree, unscrupulous CAs could easily allow governments to decrypt communications, use compromised information for a variety of political purposes and not face any retribution.

Such concerns highlight the need for individuals and organizations to look to longstanding...