Trend Micro, Organization of American States Survey Reveals Growing Concern of Cyber Threats Against Critical Infrastructure
Respondents include policymakers, industry leaders in Latin American and Caribbean countries
Respondents include policymakers, industry leaders in Latin American and Caribbean countries
Selon une récente étude menée par Avast, 66 % des français préféreraient se connecter aux réseaux Wi-Fi non sécurisés et risqueraient donc se faire voler leurs données personnelles. 30 % des français se connectent une fois par mois aux réseaux Wi-Fi publics et 24 % plusieurs fois par semaine. La raison principale pour laquelle ils se […]
summary
In 1994, the first online purchase crossed the World Wide Web: a large pepperoni pizza with mushrooms and extra cheese from Pizza Hut. Over the next 20 years, e-commerce has exploded into a bustling economy, exceeding $1.2 trillion in sales in 2013.
This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates- otherwise known as that little green padlock in the URL bar of the browser.
SSL certificates verify that the provider is who they claim to be and also indicate secure connections between personal devices and company websites. Understanding SSL certificates is important to help prevent falling victim to scammers. Because at the end of the day, not all sites, or SSL certificates, are created equal.
Different types of certificates
Website owners purchase SSL certificates through Certification Authorities (CA). There are three different types of SSL certificates, each providing a different level of security. The problem is that, even though all of these certificates provide the safety padlock in the URL bar of a browser, along with the HTTPS (“S” indicating “secure”) in the address bar, the levels of security between types of certificates differ greatly. This is why it is important to understand what kind of SSL certificate a site is using when looking to perform financial transactions or anything involving personal user data.
Can you tell the difference?

Clearly, the last URL is an EV certificate. The first is the DV certificate and the second is an OV certificate, which both look identical to each other.
What can people do to stay safe?
Now knowing what a SSL certificate is, the three different types, and that DV-enabled sites pose a risk for scams, how can users reduce the risk of shopping or performing other sensitive transactions online?
Let’s face it – online shopping isn’t going away. Until the industry requires an OV or EV certificate for e-commerce sites or an easier way to identify the types of certificates, people will have to bear some of the burden of combatting cyber risks. Knowing the risks ahead of time, consumers are less likely to be duped by phishing websites.
Readers can find more information on SSL certificates in this recent Symantec whitepaper or by visiting our Trust Services page.
The Avast biweekly wrap-up is a quick summary of what was on the Avast blog for the last 2 weeks . March Madness wraps up on April 6th. Even if you are traveling abroad, all you basketball fans can watch the game using a VPN service. Stay safe during March Madness using Avast SecureLine explains […]
Avast Remote Assistance gives you access to any other computer with Avast installed. Do your friends and family always call you when they run into a problem with their computer? Forget driving across town to help them out – if they are also Avast users, you can remotely access their computer. How to use […]
Many respondents would sell personal information for a price
Today, we celebrate World Backup Day with a reminder of how important it is to back up our data. Data loss can occur when least expected, and it’s a shame that so many irreplaceable digital memories are lost. For businesses, it can be costly – the kind of costs that can close the doors! So […]
Devastation. The feeling you get when you realize your mobile phone is missing. All those photos, contacts, and other stuff – gone forever. Why? Because it wasn’t backed up. Just in time for World Backup Day, Avast conducted a global survey to find out whether or not people back up data on their mobile devices. […]
Una nueva amenaza que roba información, denominada Trojan.Laziok, actúa como una herramienta de reconocimiento y permite a los atacantes recopilar información y adaptar sus métodos de ataque a cada computadora comprometida.
Read More
A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.Read More