Sunsetting SHA-1 and Moving to SHA-2

One of the most important parts of SSL certificates’ security is the signature algorithm. The SHA-1 cryptographic algorithm, created nearly 20 years ago, is one of the most commonly used hash function for websites that are protected with SSL.

SHA-1 is getting weaker every day and is frequently exposed to collision attacks in which hackers may obtain fraudulent certificates. However, SHA-1 is still widely used for many websites that are protected with SSL.

Read more

Web Spam: An Information Invasion

Massive web spam distribution is a disease of the modern information society. Today’s spammers are far ahead of many existing spam protection tools.

Existing tools – anti-spam gateways, the anti-spam algorithms used by search engines and built-in mail services, blog and forum filters – are not sufficiently effective against this enemy. True spam reduction requires proper understanding of existing spam technologies. Such knowledge points the way to appropriate and effective countermeasures.

Read more

Website Security Becomes Important for Google

Great news! Today Google has officially announced that using HTTPS (HyperText Transfer Protocol) is a must-have for websites.

Why HTTPS Matters for SEO

In addition to an SEO-friendly website structure, unique content, quality internal and external links and site speed optimization, establishing HTTPS with Secure Socket Layer (SSL) now also increases your site’s search engine ranking.

Read more

SSLs.com now accepts Bitcoin

We are happy to announce that you are now able to purchase SSL certificates using Bitcoin on SSLs.com

Our Bitcoin capability is powered by Stripe, one of the world’s most progressive and frictionless payment processors. SSLs.com is the first SSL shop to take advantage of Stripe’s support for Bitcoin payments. Bitcoin is one of the most widely used virtual currency based on a peer-to-peer payment network that does not exist in physical form, as it is not affiliated to any financial institutions or governments and controlled by all Bitcoin users.

Read more

Hacking History: A Timeline of Hack Tactics

Hacking is an epidemic. In 2013, Twitter, Facebook, Adobe, Target and NBC were all the victims of high-profile security breaches – and they weren't alone.

It’s estimated that 30,000 websites are hacked every single day, ranging from small company blogs to social media behemoths. However, hacking wasn’t always the premise of criminals seeking to defraud companies. Hacking originally emerged in the 50s and 60s, and the earliest hacks were typically shortcuts invented to bypass or improve computer systems.

Read more