Customer Service | mail Send Email

Newsroom

Newsroom

24Nov2014

Important Dates on SHA-1 End of Trust

As part of their SHA-2 migration plan, Microsoft, Google, and Mozilla have announced that they will stop trusting SHA-1 certificates. Google will begin phasing out trust in SHA-1 certificates in November 2014.

Microsoft and Mozilla will begin phasing out trust for SHA-1 certificates in 2016. With these dates fast approaching, it’s time to move to SHA-2.

  • Last update: 24 November 2014
Read more...
18Nov2014

Public Statement on Darkhotel Issue

KASPERSKY REPORT “THE DARKHOTEL APT; A STORY OF UNUSUAL HOSPITALITY version 1.0”

We are referring to the latest report by Kaspersky Lab’s Global Research and Analysis Team that was produced in November 2014 with the title of “THE DARKHOTEL APT; A STORY OF UNUSUAL HOSPITALITY version 1.0”. The report has affected several CAs around the globe including Digicert Malaysia.

The Darkhotel APT has been recognized as a form of attack to target high-profile figures with bad intention while leveraging hotel’s wifi network that has weak security of implementation. As part of the attack process, it has been reported that attacker has been duplicating OLD and revoked certificates of several CAs including Digicert Malaysia.

  • Last update: 18 November 2014
Read more...
18Nov2014

Vulnerability ALERT: OpenSSL Heartbleed Bug

DIGICERT has received information from Malaysian Computer Emergency Response Team (MyCERT) regarding vulnerability that exists on OpenSSL Versions 1.0.1 through 1.0.1f that could disclose sensitive information belonging to users to an attacker.

The vulnerability allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. There is a possibility that this may compromise the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users.

  • Last update: 18 November 2014
Read more...


FIRST ...
1 2 3 4 5