DigiCert Blog

All posts under: Vulnerabilities

  1. Internet of Things Vulnerabilities in the Sky

    With new TSA restrictions following the attacks of 9/11, most Americans have settled their fears associated with flying. But with the evolution of the Internet Age we may be facing a new security concern in the skies: the Internet of Things. In January, the United States Government Accountability Office conducted an investigation and reported that the…


  2. Certificate Inspector: Missing Fields

    DigiCert Certificate Inspector is included as part of the CertCentral BETA program DigiCert announced on April 20, 2015. Although Certificate Inspector is not a new certificate management service, it is still essential for assuring that your SSL Certificates are compliant with industry standards and are deployed correctly. Certificate Inspector helps you make sure your certificates…


  3. PCI Releases DSS 3.1, Puts Expiration on Weak Encryption

    As was recently announced by the Payment Card Industry (PCI) in the Data Security Standard (DSS) version 3.1, SSL and early TLS will no longer be accepted as strong cryptography come June 30, 2016. Effective immediately is the outlaw of installing new technology that uses SSL or early TLS. With the exposed vulnerabilities FREAK and…


  4. IoT Security as a Marketing Advantage

    Road trips are part of almost any American childhood, and more often than not, the stereotypes are true. Dad drives, getting lost at least once and refusing to stop for directions. Mom’s trying to make the car ride less boring with occasional family sing-alongs. Your brother zones out while listening to music on music on his cassette player.…


  5. OpenSSL Patches 12 Security Vulnerabilities

    Early this morning, OpenSSL released patches for new security vulnerabilities found in OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf. These patches fix a total of 12 vulnerabilities, two of which were rated as high severity. According to the OpenSSL advisory, one of the high severity vulnerabilities can be exploited to allow a DoS attack against…