DigiCert Blog

All posts under: Encryption

  1. Logjam Attack: What You Need to Know

    Called the Logjam attack, this new potential vulnerability allows an attacker to intercept HTTPS connections between vulnerable clients (browsers) and servers and force them to downgrade the connection to 512-bit export-grade cryptography. The attacker can then read and change any data passed through this connection. The attack is similar to the FREAK attack because it…


  2. Medical Device Security: Now Is the Time

    Healthcare is making innovative strides in every corner of the industry. Equipment that once needed to be plugged in and connected to a hospital bed are now portable and wireless. Nearly everyone is using a wearable fitness device. While the convenience is noted, the security concerns with medical devices, especially those connected to the Internet,…


  3. Understanding the Google Chrome Connection Tab

    Chrome has made changes to the Connection Tab in Chrome 44. For the updated blog post, click here. The yellow triangle or red ‘X’ icons in Google Chrome’s “Connection” Tab are alarming and can be difficult to understand. Below are four brief explanations about what causes the warnings and some tips for resolving related problems. Public Audit…


  4. Internet of Things Vulnerabilities in the Sky

    With new TSA restrictions following the attacks of 9/11, most Americans have settled their fears associated with flying. But with the evolution of the Internet Age we may be facing a new security concern in the skies: the Internet of Things. In January, the United States Government Accountability Office conducted an investigation and reported that the…


  5. Enterprise Security: Are Your Partners Secure?

    Making partnership decisions is contingent on creating symbiotic relationships. Most businesses choose their partners in order to increase sales, achieve common goals, and expand marketing reach. One thing that can go unnoticed when choosing a partner, however, is the organization’s dedication to secure business practices. With security risks as high as they are today, you cannot assume…