The Latest in IT Security

Experts Explain How Wildcard Certificates Are Being Abused for Phishing Attacks

21
Mar
2014

Phishing is one of the most common and most successful attack vectors and it probably will remain so for some time. However, cybercriminals often abuse various legitimate technologies to make their operations more effective.

A perfect example is wildcard certificates, public key certificates used by all the subdomains within a larger domain.

On one hand, wildcard certificates are useful for system administrators because they dont have to worry about managing d…

Tags:  
Comments are closed.

Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments