Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Website Security Solutions
Showing posts tagged with Code Signing
Showing posts in English
Tim Callan | 22 Apr 2006 | 1 comment

In a recent post I alluded to a lack of clarity around the name of the new higher-authentication SSL standard. Up to now it's been code-named High Assurance SSL, but that name won't be the final one. I want to give you the background and spell out some criteria for an effective name.

Tim Callan | 20 Apr 2006 | 0 comments

I read a couple nice articles in CSO Magazine recently. One has a nice, comprehensive summary of phishing as it exists today and pragmatic things site owners can do to combat it. The other is a summary of e-mail certificates and how they fit into phishing prevention.

Tim Callan | 18 Apr 2006 | 2 comments

One thing that continues to amaze me is the very large number of Web forms I see on line that are not protected with any SSL at all. While I do occasionally notice a Web form that actually requests a credit card order and doesn't offer at least the encryption that comes with the presence of an SSL Certificate, I'm not even talking about these gross offenders. What's much more common is the sites requesting information one step down from a credit card in sensitivity that don't bother to make the minimal investment in security for their site visitors that an SSL Certificate entails.

Tim Callan | 14 Apr 2006 | 0 comments

A new exploit has been discovered that makes it possible for a phisher to fake a URL in the address bar of any Internet Explorer 6 browser, including the latest and most secure versions. I expect Microsoft will fix this exploit pretty quickly. However, this exploit highlights the value of increasing the phishing security in browsers. Firefox took the first important steps in this effort at the end of 2004. Browsers like Netscape and Opera followed suit, and now we're anticipating Microsoft's addition to the high-security browser market with Internet Explorer 7. Phishers will continue to discover new ways to trick people, of course, and we as an industry must maintain our laser focus on preventing those tricks wherever possible. VeriSign'...

Tim Callan | 13 Apr 2006 | 0 comments

I will be presenting at Infosec this year. Infosec is Europe's largest IT security conference, and it takes place April 25 through 27. I am presenting on High Assurance SSL and will go over why they matter, how they work, what they'll look like in the browser, and when you can get one. If you're going to be at InfoSec, make a point of attending this presentation.

I will be presenting in the London Room, which is right by the front entrance of the show. I'm scheduled to go on April 25 from 2:35 to 3:10.

Tim Callan | 12 Apr 2006 | 0 comments

We just did our quarterly certificate count, and for the first time in history a CA has passed the half million mark for active SSL Certificates. Just in case you're wondering, it's VeriSign. An active SSL Certificate is a certificate in its validity period that has not been revoked, and therefore this certificate count implies that VeriSign SSL is securing over half a million Web servers simultaneously. Right now.

I don't know about you, but I think that's pretty cool.

Tim Callan | 11 Apr 2006 | 2 comments

On March 21 Microsoft announced the slip of Vista to January 2007. Or more accurately we might say not earlier than January 2007. Don't confuse this post with a Microsoft bash. Operating systems are big, complicated platforms with giant, labyrinthine sets of hardware, software, peripherals, APIs, standards, and protocols to support. It takes a long time to get one right, and I'd rather they released it when ready than rushed something to market too early.

The reason I'm talking about this announcement is that the ship date for IE 7 may be tied to the ship date for Vista. IE 7 has been positioned as a part of the Vista release, and although a backrev version will be provided at least for XP, it's still a reasonable scenario that IE 7 will not go to GA status until Vista is in gold disk. This question matters to SSL of course, because IE 7 will in many ways offer the most...

Tim Callan | 06 Apr 2006 | 0 comments

Well, it's April. In the United States, April means taxes. And in recent years, April means huge numbers of tax returns filing online. Last year over ten million tax returns were filed on the Internet. This year I expect the numbers to greatly exceed last year's.

Why do I bring this up? Tax returns in many ways are the poster children for the need for online security. Where else do you have all the information a criminal requires to steal your identity gathered together in a single, convenient place? Your return includes your Social Security Number, full name, spouse's name, and address. It says the banks in which you have accounts, whether or not you own a home, and even how much you make, so the criminals can more easily target the highest value victims.

Tim Callan | 05 Apr 2006 | 0 comments

A tip of the hat to the SANS Institute for today's bulletin advising site administrators to upgrade their VeriSign security seals to the most current architecture. This new architecture makes it easier for site visitors to distinguish genuine VeriSign seals from spoofs and therefore decreases a site's vulnerability to phishing attacks. The SANS Institute is a widely respected provider of information security training and certification. Way to go, guys.

Tim Callan | 05 Apr 2006 | 0 comments

This NetworkWorld article describes the presentations of some MIT researchers in the areas of wireless networking and phishing. The phishing portion in particular was interesting to me in that it reports,

Given that phishing schemes are so tricky, [MIT Assistant Professor] Miller's team is concentrating its efforts on redesigning browsers so that a user's intentions are clear to them. In other words, if a user wants to go to the site of a certain retailer, the browser would confirm the real URL for the retailer rather than letting the user go to a similar-looking, but bogus site. Key to doing this is improving not just security but usability, as Miller noted that enough roadblocks have already been thrown in front of users -- in the name of security -- when they try to conduct transactions on the Web.

What's noteworthy of course is that this...