Cybersecurity New Year’s resolutions, you say? Why not.

It’s no surprise that our resolutions are usually about health, finances, relationships, and self-improvement. As all of us live digital lives, too, why not think up cybersecurity New Year’s resolution that concern our online health and safe… Continue reading Cybersecurity New Year’s resolutions, you say? Why not.

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudu… Continue reading Phishers use encrypted sites to scam

Post of the Week: SSL on a Virtual Server

In this Lightboard Post of the Week, I answer a few questions about SSL/https on Virtual Servers. BIG-IP being a default deny, full proxy device, it’s important to configure specific ports, like 443, to accept https traffic along with client and … Continue reading Post of the Week: SSL on a Virtual Server

19-Year-Old TLS Vulnerability Weakens Modern Website Crypto

New research shows how an old vulnerability called ROBOT can be exploited using an adaptive chosen-ciphertext attack to reveal the plaintext for a given TLS session. Continue reading 19-Year-Old TLS Vulnerability Weakens Modern Website Crypto