Analytics
11/15/2012
03:01 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GlobalSign SSL Configuration Checker Provides Guidance To Reduce Cybercriminals' Ability To Exploit Faulty SSL Configurations

Free online service allows website administrators to confirm that they have correctly configured SSL

BOSTON, MA – Nov. 15, 2012 - GlobalSign, one of the leading providers of SSL Certificates worldwide, today announced availability of its SSL Configuration Checker. This free online service allows website administrators to confirm that they have correctly configured SSL across their websites and receive actionable guidance on how to remediate any faulty or exploitable SSL configurations. Correctly configured SSL improves website performance and strengthens security, allowing organizations to preserve the end-user experience and provide better defense against SSL BEAST, CRIME, and other common and damaging attacks that exploit faulty SSL configurations.

Any organization can use the service by visiting sslcheck.globalsign.com. Once there, users simply enter the URL of the website they want to check. After a brief scan, the user receives a letter grade with a simplified explanation of any issues found in the website's SSL configuration and actionable remediation steps. The SSL Configuration Checker integrates the assessment technology of Qualys SSL Labs, which is focused on auditing the SSL ecosystem, raising awareness, and providing tools and documentation to web site owners so they can improve their SSL implementations. The tool is immediately available in Dutch, English, French, German, Japanese, Russian and Spanish to service the Internet at large.

"Research from Qualys SSL Labs shows that more than 70% of websites using SSL are configured incorrectly which has resulted in poor performance and weakened security. Unfortunately, until now there has been a lack of user-friendly resources to help administrators apply SSL securely," said Ryan Hurst, GlobalSign CTO. "With the availability of SSL Configuration Checker, GlobalSign is adding context to SSL issues by helping companies understand how best to configure SSL to reduce their risk and optimize performance. Our goal is to help all organizations reduce SSL-related risks."

"Configuring SSL properly is an important step in realizing the benefits of SSL. However, it's often hard for administrators to find comprehensive guidance on how to accomplish this goal," said Ivan Ristic, director of engineering at Qualys. "Our work with GlobalSign is addressing this need and making the Internet a safer place for everyone."

"Security doesn't end at the close of a technology sale. Providers need to deliver ongoing support for products and services that allow their customers to maximize the value of their solutions and increase their effectiveness as the threat landscape changes," said Richard Stiennon, noted security author, speaker and founder of IT-Harvest. "As a Certificate Authority, GlobalSign is in the best position to understand website administrators' needs in configuring SSL and remediation of security issues."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

CVE-2015-0802
Published: 2015-04-01
Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a p...

CVE-2015-0803
Published: 2015-04-01
The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) ...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.