Internet Explorer ???????????????????????????UXSS?????
攻撃者は、Internet Explorer の新しいゼロデイ脆弱性を悪用すると、クロスサイトスクリプティング(XSS)によって同一生成元ポリシーを回避できる可能性があります。
Read More
攻撃者は、Internet Explorer の新しいゼロデイ脆弱性を悪用すると、クロスサイトスクリプティング(XSS)によって同一生成元ポリシーを回避できる可能性があります。
Read More
Revision Note: V37.0 (February 5, 2015): Added the 3021953 update to the Current Update section.Summary: Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows S…
Internet Explorer에서 새로 발견된 제로데이 취약점은 공격자가 크로스 사이트 스크립팅(XSS)을 통해 SOP(Same-Origin Policy)를 우회하는 것을 가능케 합니다.
Read More
A new zero-day vulnerability in Internet Explorer could allow attackers to bypass the same-origin policy through cross-site scripting (XSS).Read More
summary
The CA/Browser Forum is an unincorporated association of separate organizations that creates the guidelines that apply to all SSL certificate and browser providers. Since the effected date of 1 July 2012 Symantec has been notifying customers in regards to certificates with a SAN or Common Name (CN) field that contains a Reserved IP Address or Internal Server Name since they are being phased out due to CA/Browser Forum standards.
This one particular standard has some customers in a bind when renewing or enrolling into a CA signed SSL certificate. Below is the Standard.
9.2.1Subject Alternative Name Extension
Certificate Field: extensions:subjectAltName
Required/Optional: Required
Contents: This extension MUST contain at least one entry. Each entry MUST be either a dNSName containing the Fully-Qualified Domain Name or an iPAddress containing the IP address of a server. The CA MUST confirm that the Applicant controls the Fully-Qualified Domain Name or IP address or has been granted the right to use it by the Domain Name Registrant or IP address assignee, as appropriate.
Wildcard FQDNs are permitted.
As of the Effective Date of these Requirements, prior to the issuance of a Certificate with a subjectAlternativeName extension or Subject commonName field containing a Reserved IP Address or Internal Name, the CA SHALL notify the Applicant that the use of such Certificates has been deprecated by the CA / Browser Forum and that the practice will be eliminated by October 2016. Also as of the Effective Date, the CA SHALL NOT issue a certificate with an Expiry Date later than 1 November 2015 with a subjectAlternativeName extension or Subject commonName field containing a Reserved IP Address or Internal Name. Effective 1 October 2016, CAs SHALL revoke all unexpired Certificates whose subjectAlternativeName extension or Subject commonName field contains a Reserved IP
Address or Internal Name.
(More information about the CA/B Forum Baseline Requirements can be found at cabforum.org)
This standard means SSL certificates can only be issued to Fully Qualified Domain Names (FQDN) and can no longer be issued to Non-Valid internal names.
Example: |
|
Valid FQDN’s |
Non-Valid Internal |
abc.com |
abc.local |
secure.abc.com |
abcServer123 |
autodiscover.abc.com |
192.168.0.1 |
In response to this change customers have to take two main course of action:
To help our customers avoid the dangers of a self-signed CA, Symantec is now offering the Private CA.
The Symantec Private CA ensures:
This is offered though the Managed PKI for SSL Account. Use the same console to managed external as well as internal certificates. Ask your account manager for more details! More detailed Information on the Symantec Private CA can be found at www.Symantec.com/private-ssl
summary
When my older daughter started middle school I was invited to the website where her grades were available real-time. They’re updated continually by her teachers based on every quiz, homework assignment, and test that she takes. This is a substantial improvement over infrequent report cards and teacher meetings, giving me the ability to detect, early on, any areas needing greater focus (not that it’s needed with my straight-A student). Unfortunately, when I checked the security of the site, I found that “secure login” was optional and, in the case of the middle-school’s implementation, everything was completely unsecured. This included not only my kid’s grades but also the ability to look her up and message her directly. While the school fixed this very quickly, it highlights how easy it is for site operators to miss even the most basic of security practices. As more education is done and administered online, the bar is only getting higher for institutions to protect their student data as well as their own.
As the world’s largest security company, we continually ask how we can educate people about security and whether the sites that they are visiting are secure. The bottom line is that it needs to be simple — yes or no. The Norton Secured Seal communicates that “yes, this site is secure” to more people than any other seal or browser-based visual cue. Behind the scenes there’s a lot that goes into the display of that seal… Is the data encrypted? Is the site run by a legitimate company? Is the site free from Malware? Only when the answer is yes to all of these questions will visitors see the Norton Secured Seal.
In honor of Digital Learning Day, we are doing our part to both keep people secure and to educate the world about security. Combined with our 24/7 support team, we hope to increase security at educational institutions and let them easily train their visitors to look for the seal that tells them that they’re secure.
Adobe Flash Player の新しい深刻な脆弱性 CVE-2015-0313 に対するパッチは、今週公開される予定です。
Read More
Patch due to be published this week for critical new Adobe Flash vulnerability CVE-2015-0313.Read More
New evidence suggests that the skeleton key malware, known as Trojan.Skelky, could be linked to the Backdoor.Winnti malware family.Read More