Is there a list of known deprecated/unsafe certificate authorities?

Is there a list of known deprecated/unsafe certificate authorities (CAs)?

For example:

TurkTrust
DigiNotar

Are there other “trusted” CAs that should not be or are not trusted (by browsers anymore) and why? Or better is t… Continue reading Is there a list of known deprecated/unsafe certificate authorities?

Which Extensible Provisioning Protocol (EPP) status-values provide sufficient protection against domain hijacking?

The Extensible Provisioning Protocol (EPP) as described in RFC 5730, can possibly be protective against domain hijacked. The protocol consists of the 17 following status-values as described in RFC 5731:

clientDeleteProhibit… Continue reading Which Extensible Provisioning Protocol (EPP) status-values provide sufficient protection against domain hijacking?

What is worse for password strength, a poor password policy or no password policy at all?

Recently I saw the following screenshot on Twitter, describing a obviously terrible password policy:

I wonder what is worse for the password strength. Having no password policy at all or a poor password policy (like descri… Continue reading What is worse for password strength, a poor password policy or no password policy at all?

Is the injection in a NoSQL database architecture also called SQL injection?

Is the injection in a NoSQL database architecture also called SQL injection and is it still part of the OWASP 2013 Top 10, category A1 Injection?

For example, an injection in code that communicates with the following databas… Continue reading Is the injection in a NoSQL database architecture also called SQL injection?

Is the injection in a NoSQL database architecture also called SQL injection?

Is the injection in a NoSQL database architecture also called SQL injection and is it still part of the OWASP 2013 Top 10, category A1 Injection?

For example, an injection in code that communicates with the following databas… Continue reading Is the injection in a NoSQL database architecture also called SQL injection?

Is the injection in a NoSQL database architecture also called SQL injection?

Is the injection in a NoSQL database architecture also called SQL injection and is it still part of the OWASP 2013 Top 10, category A1 Injection?

For example, an injection in code that communicates with the following databas… Continue reading Is the injection in a NoSQL database architecture also called SQL injection?