Keeping your data fully protected online is a notable achievement — a reward to those who educate themselves about internet security. One of the many useful tools available to businesses and consumers is the SSL VPN. As the name implies, this technology is a mashup of sorts, combining the encryption protocol of SSL with the portal functionality of a VPN.
With the huge number of technological advancements in recent years and the fact that you can do almost anything online these days, it can come as a surprise that we mostly still do elections the old-fashioned way. When it comes to casting a vote, putting pen to paper and counting each ballot by hand is still considered the most reliable method.
For anyone immersed in the world of tech, the advent of quantum computing is an exciting prospect. Quantum computers have the potential to bring about unprecedented innovation across various fields, from pharmaceuticals research to the automobile industry. However, once quantum computing does become more widespread, it’s likely to undermine what we consider to be tried-and-true IT staples, including the encryption protocols we use today.
A few weeks back, we wrote an article about the rise of coronavirus-related cybercrime in 2020. While it was certainly a disturbing account of the myriad ways cybercriminals can take advantage of the unassuming general public, it was by no means an exhaustive list of the cybercrimes that have occurred in recent times. Not by a longshot.
The reason why businesses of any size today get off the ground and thrive with relative ease is due to the existence of IoT. IoT creates opportunities for innovation, allowing for the creation of technologies that were previously thought of as impossible. For small businesses, IoT can help streamline operations from the start, so that businesses owners can focus on growth.
Public Key Infrastructure (PKI) is kind of a big deal. It underpins widespread web encryption and the entire system of privacy and data protection across the Internet and many other public networks. In short, it’s what makes your SSL certificate work and helps keep your private information private on a daily basis. But what is it, exactly, and how does it work?
A team of researchers has recently discovered a vulnerability that can affect HTTPS and other services that utilize TLS or SSL. Known as the Raccoon Attack, this vulnerability specifically affects TLS 1.2 and earlier versions of the encryption protocol. Is it something the average website owner should worry about? (Spoiler: not really, but it’s always good to be informed.)