Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Red Hat: 2012:1174-01: kernel: Low Advisory

Aug23
by Ike on August 23, 2012 at 2:18 am
Posted In: Uncategorized

(Aug 21) Updated kernel packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low [More…]

└ Tags: Red Hat, security, update
 Comment 

Phishing on sites using SSL Certificates

Aug22
by Ike on August 22, 2012 at 2:50 pm
Posted In: security

Over the years the Internet community has been taught that one of the key steps in protecting their personal information on the Internet is to ensure that it is entered only over an encrypted connection, perhaps by looking for the lock symbol in the browser address bar or web addresses beginning with https://. As a result, phishing attacks which make use of SSL certificates are especially dangerous  as most users associate the presence of a valid SSL certificate with an increased level of assurance. Such attacks  erode the reputation of Certificate Authorities and SSL certificates, which makes identifying and revoking maliciously used certificates a material issue.

Netcraft’s anti-phishing feed has blocked over 5 million unique phishing sites to date, receiving over 4 reports a minute from our reporter community, and while the majority of phishing attacks run over HTTP,  a significant number run on sites for which SSL certificates have been issued. In July 2012 alone, Netcraft found 505 unique valid certificates on blocked sites.

The following table, produced for the Netcraft SSL Survey, shows the number of unique valid certificates returned by phishing sites that were blocked by Netcraft in July 2012:

Certificate Authority (CA) Unique certificates …with matching Common Names …and accessed by https://
Symantec 216 41 21
Comodo 130 16 7
Go Daddy 67 19 8
Other 41 11 6
GlobalSign 39 2 1
DigiCert 12 2 2

The columns of the table are ordered left to right by trustworthiness, as using a valid SSL certificate is not always enough to trick a user into trusting a phishing website and two further conditions have to be met:

  • The Subject Common Name of the certificate has to match the hostname of the phishing site that returned it. Some sites will return the hosting company’s certificate when requested over HTTPS. As most modern browsers display warnings when a non-matching certificate is encountered (pictured below), such certificates only serve to make the user more suspicious instead of increasing the perceived security of the site.
  • A phishing site accessed over HTTPS displays the SSL certificate for the hosting company.

  • The phishing attack has to actively use the SSL certificate by including https:// in the phishing URL. Having a valid SSL certificate does not make a phishing site appear more trustworthy if victims only access it over HTTP.

Fraudsters will often host their phishing content on a compromised website and so can make use of the website’s legitimate certificate, however they may not have realized that SSL services are available and so serve the content over HTTP. None of the certificates found on phishing sites in this period appeared to have been issued specifically for the purpose of phishing.

Taking Certificate Authority market shares into consideration, Go Daddy has a lower proportion of its SSL certificates used in phishing attacks than the other large CAs, in part because it provides the hosting for a large proportion of the certificates which they issue and is a long term user of Netcraft’s feed to remove phishing attacks.

└ Tags: security
 Comment 

Debian: 2531-1: xen: Denial of Service

Aug21
by Ike on August 21, 2012 at 1:46 am
Posted In: Uncategorized

(Aug 18) Several denial-of-service vulnerabilities have been discovered in Xen, the popular virtualization software. The Common Vulnerabilities and Exposures project identifies the following issues: [More…]

 Comment 

Plesk Automation Preview Installer has been updated!

Aug20
by Ike on August 20, 2012 at 1:21 pm
Posted In: Plesk, Releases

Plesk Automation team is pleased to introduce an improved Installation Script of the PPA. Thanks to all for feedback!

 Comment 

Parallels Plesk Automation Preview Installer has been updated!

Aug19
by Ike on August 19, 2012 at 11:34 pm
Posted In: Plesk, Releases

Plesk Automation team is pleased to introduce an improved Installation Script of the PPA. Thanks to all for feedback!

└ Tags: Installation Script, Plesk Automation, PPA
 Comment 
  • Page 2,854 of 2,984
  • « First
  • «
  • 2,852
  • 2,853
  • 2,854
  • 2,855
  • 2,856
  • »
  • Last »

What’s New?

  • Fedora 42: mingw-libsoup Critical Out-of-Bounds Read CVE-2025-11021
  • Fedora 42: mingw-python3 Critical Denial Service Fix CVE-2025-12084
  • Fedora 42 pgadmin4 Critical Remote Code Exec Fix 2025-b08763f674
  • Fedora: Gobuster Critical Update Released for CVE-2025-58188 Advisory
  • Debian: Rails Severe Command Manipulation DSA-6090-2 CVE-2025-24294
  • Debian Trixie WordPress Security Advisory DSA-6091-1 for CVE-2025-58246
  • Debian: Chromium Important Code Exec and Info Disclosure DSA-6089-1
  • Debian Trixie: php8.4 Important DoS Memory Disclosure DSA-6088-1
  • Fedora 42: uriparser CVE-2025-67899 Fix for Unbounded Recursion Issue
  • Fedora 42: util-linux Critical Buffer Overflow CVE-2025-14104 Advisory
  • Fedora 42: mqttcli Update 0.2.8 Critical Integer Overflow Issues
  • Fedora 42: Chromium High CVE-2025-14765 Out of Bounds Security Risks
  • Debian: Roundcube Important XSS and Information Leak Fix DSA-6087-1
  • Debian: MediaWiki DSA-6085-1 Security Updates for DoS and XSS
  • Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282
  • Plesk 2025: A Year in Review
  • Ubuntu 24.04: Linux Xilinx Important Kernel Security Fix USN-7931-4
  • Ubuntu 22.04 LTS: Linux Kernel Critical Fix for Raspberry Pi USN-7928-4
  • Ubuntu 18.04 LTS – Oracle Kernel Critical Security Flaws USN-7922-3
  • Ubuntu 24.04: Advisory USN-7921-2 for Real-time Kernel CVE-2025-39946
  • Debian Trixie: c-ares Critical Denial of Service Advisory DSA-6084-1
  • Debian: webkit2gtk Important Memory Corruption Issues DSA-6083-1
  • Fedora 42: brotli 1.2.0 Critical DoS Fix FEDORA-2025-9e233a4e22
  • Fedora 42: perl-Alien-Brotli Faces Critical Denial-of-Service Risk
  • Fedora 42: CUPS Critical Local DoS Issue FEDORA-2025-c09b980696

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.75 mb Memory usage. 0.467 seconds.