Default title



Secure Certificates protect almost everything on the internet. Whether Symmetric or Asymmetric the foundational technology usually relies on a certificate or key. The key system is usually part of a set of private and public keys used for various purposes and relying on eachother for functionality.

Implementing a certificate is a very well documented process. In many cases it is too well documented and allows for less than qualified person's to effectively demonstrate a skill that they do not fully understand.

In an asymmetric key system the private key is never presented publicly, only public keys are presented to systems who wish to communicate with the target system. This is where a major security problem usually creeps into an otherwise secure system. Many times in my career I have noticed Private Keys left on the System Drives or desktops of mail servers, web servers and Linux Systems. These private keys are the kryptonite to good PKI. Keys should never be left unaccounted for or misplaced. They should be stored offline using secured, audited access methods. Gaining access to the private key of a secured system allows unfettered access to any encrypted communications using that key. This potentially allows access to emails, passwords, queries, bank information etc not because of a technical problem but instead because a lack of process and poor understanding of the technology. It is a purely preventable issue. If your key has been copied because it was left unsecured and is being used to read your encrypted communications there are very few tell-tale signs.

It might be tempting to let more junior people perform your key maintenance it is always advisable to leave anything regarding security safely in the hands of the experts who understand the technology.


- Chris Calvert
Making Sense of the Security Sensor Landscape
Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.
- Tom Spring
High-Severity Chrome Bugs Allow Browser Hacks
Desktop versions of the browser received a total of eight fixes, half rated high-severity.
- Tara Seals
Novel Online Shopping Malware Hides in Social-Media Buttons
The skimmer steals credit-card data, using steganography to hide in plain sight in seemingly benign images.
- Tara Seals
VMware Rolls a Fix for Formerly Critical Zero-Day Bug
VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to "important."
- Elizabeth Montalbano
Vancouver Metro Disrupted by Egregor Ransomware
The attack, which prevented Translink users from using their metro cards or buying tickets at kiosks, is the second from the prolific threat group just this week.
- Tara Seals
Kmart, Latest Victim of Egregor Ransomware – Report
The struggling retailer's back-end services have been impacted, according to a report, just in time for the holidays.
- Tara Seals
TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions
A new "TrickBoot" module scans for vulnerable firmware and has the ability to read, write and erase it on devices.
- Tara Seals
DeathStalker APT Spices Things Up with PowerPepper Malware
A raft of obfuscation techniques turn the heat up for the hacking-for-hire operation.
- Threatpost
Reverse Engineering Tools: Evaluating the True Cost
Breaking down the true cost of software tools in the context of reverse engineering and debugging may not be as clear-cut as it appears.
- Lindsey O'Donnell
Cyberattacks Target COVID-19 Vaccine ‘Cold-Chain’ Orgs
Cybercriminals try to steal the credentials of top companies associated with the COVID-19 vaccine supply chain in an espionage effort.


Leave a Reply

Your email address will not be published. Required fields are marked *

eleven − 5 =