Access "Tackling SSL vulnerabilities for secure online transactions"
This article is part of the January/February 2012 issue of Combat the latest malware threats with effective antimalware planning
Despite the economic gloom, business is booming on the Internet. An IBM study of 500 retailers reported that online Black Friday sales were up 24.3 percent year-over-year, while according to statistics from U.K.-based online retail software company MetaPack, online sales in December were up 30 percent and the last week before Christmas saw almost double the sales compared with last year. Critical to this success and the ongoing viability of any kind of Internet business is the ability of customers to complete secure transactions online. Whether it’s a financial transaction or logging into an online account, users need to be able to verify who they are communicating with and know that the contents of that communication are safe. However, a number of attacks on high-profile certificate authorities last year have highlighted the fallibility of Web server certificates, while the security of Secure Sockets Layer (SSL), the protocol behind secure online transactions, has been called into question. In this article, we’ll examine the infrastructure for online ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
New malware threats require new antimalware protection strategy
by Lisa Phifer
Attackers are targeting new vectors such as smartphones, social media and cloud services. Enterprises need to up their game.
-
Tackling SSL vulnerabilities for secure online transactions
by Michael Cobb, Application Security
A rash of CA breaches shows up weaknesses in the SSL infrastructure. Take action to protect your customers and employees.
-
New malware threats require new antimalware protection strategy
by Lisa Phifer
-
-
Mobile device protection: Tackling mobile device security risks
by Marcia Savage, Editor
Managing mobile device risks tops the list of priorities for security pros this year.
-
SOPA and PIPA pirating laws lose support in face of opposition
by Robert Westervelt, News Director
Security experts say there are better alternatives to copyright protection.
-
Mobile device protection: Tackling mobile device security risks
by Marcia Savage, Editor
-
Columns
-
Can a computer security researcher go too far?
by Elizabeth Martin
An examination of three cases illustrates that it’s not always a clear case of good vs. evil.
-
Ranum chat: APT attacks and malware evolution
by Marcus Ranum
Security expert Marcus Ranum talks with Joel Yonts, a seasoned security executive with a passion for information security research.
-
Security leaders help squash SOPA, PIPA pirating laws
by Michael S. Mimoso, Editorial Director
Prominent security and Internet thinkers and leaders have become an effective lobby on Capitol Hill and played a big role in squashing SOPA.
-
Can a computer security researcher go too far?
by Elizabeth Martin
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO