• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Thanks for Helping Take Care of Security, Google

June 26, 2019 By Emil Hozan

By now, most folks should know the difference between hypertext transfer protocol (HTTP) and HTTP secure (HTTPS). If not, HTTP is human-readable content floating through the inner tubes of the magical Internet. HTTPS is an encrypted format of this content, ensuring only involved parties can communicate between each other. The latter is performed by registering a domain name and … [Read more...]

Firefox Certificate Security Breaks Vendor Security – Daily Security Byte EP. 198

January 8, 2016 By Corey Nachreiner

Mozilla got serious about security early this new year by banning potentially weak certificates created using the SHA-1 hashing function. Unfortunately, many security vendors still use SHA-1, so this browser update broke some things. If you've been affected by the Firefox changes, or are concerned with our products stance on SHA-1 certificates, watch today's video. Show note: … [Read more...]

Lots of Duplicate Keys – Daily Security Byte EP. 183

December 2, 2015 By Corey Nachreiner

You've heard me talk about the Lenovo Superfish issue, and Dell's Superfish 2.0. Both these vendors shipped products with identical digital certificates, which makes it easier for attackers to trick these devices into trusting them, if they can get into the path of the devices' communications. Well, the news just got even worse. Watch today's episode to learn about the latest … [Read more...]

Exploding Security Chips – Daily Security Byte EP.142

September 14, 2015 By Corey Nachreiner

Hardware security is becoming as important as software security, especially with the development of secure boot systems that require digital certificates on chips. Watch today's video for an interesting new take on securing the data on computer chips from prying eyes. (Episode Runtime: 1:50) Direct YouTube Link: https://www.youtube.com/watch?v=aiEJAnBdaQ4 EPISODE … [Read more...]

Chinese DDoS, Cyber Sanctions, and Dyre Wolf – WSWiR Episode 146

April 3, 2015 By Corey Nachreiner

I can barely keep up with my daily work tasks and home errands; How do you expect me to know the latest information security news? Does that sound like you? If so, this security video was designed to help. I cover an important security story every day, and then summarize them all in this quick weekly video. Check it out to keep informed. Today's episodes has stories about … [Read more...]

Next Page »

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use