New document available on the Nameshield’s website: “5 minutes to understand – Data theft of a website

Every day, new cyberattacks are threatening companies’ defense systems, and further weaken relations with web users, particularly on e-commerce websites. Identity theft and data theft have become common.The risks of a malicious person intercepting the data transmitted by the web user on your website and more generally all the information transmitted between the browser and the server of your website ,are increasing significantly.Find in this “5 minutes to understand” document, availab... Read More

Firefox 83 launches HTTPS-Only mode

On November 17, Mozilla released the version 83 of the Firefox browser, promising improved performance in terms of page loading and browsing responsiveness, as well as a significant reduction in the memory used. But above all, Mozilla introduces a brand-new security feature to the small world of browsers, an “HTTPS-Only Mode” option to limit browsing to secure HTTPS* connections only. Image source: Mozilla Security Blog Mozilla is pushing it further regarding the desire of ... Read More

The dangers of Wildcard certificates

Image source: skylarvision via Pixabay TLS/SSL certificates are used to authenticate servers (mostly Web) and encrypt traffic between websites and users. Thus, they ensure the integrity of the data exchanged and prevent data spying. The digitalization of the company and the world in general, as well as the browsers’ desire to impose HTTPS:// by default, have multiplied exponentially the need for certificates. To meet these growing needs, the wildcard certificate (*.domainname.com) i... Read More

Discover the Cybervictime.net website, launched on the occasion of the Cybersecurity Month

Source : Cybervictime.net website October is the month in Europe that celebrates cybersecurity. Every year, the aim of this operation is to make users aware of digital security issues, both on a personal and professional level. Many players are mobilized on this occasion to alert on cyber risks and inform on existing protection measures. It is in this context that the website cybervictime.net was launched! This website is a digital manual of easy to implement solutions to protect yo... Read More

New document available on the Nameshield’s website: “5 minutes to understand – The protection of your domain names”

Domain name is the first link between the web user and your website. It is thanks to the domain name that you are found on the Internet, that you are visible, that your identity is displayed and that you develop your business on the net. It is a digital asset of your business.The management and configuration of these domain names usually requires access to a management interface. The absence of a security policy can be dramatic.Find in this “5 minutes to understand” document, av... Read More

HTTPS://: China doesn’t like confidentiality and blocks the ESNI extension

Image source: HealthWyze via Pixabay According to a joint report by iYouPort, the University of Maryland, and the Great Firewall Report, TLS connections using the preliminary encrypted SNI extension (ESNI) are being blocked in China. A new step towards censorship and a desire to be able to track Internet users. What is SNI (Server Name Indication)? When an Internet user consults a website in HTTPS://, it means that the site is secured by an SSL/TLS certificate. The consultation of the ... Read More

Interpol warns of alarming rise in cyberattacks during COVID

Image source : geralt via Pixabay In a new study of August 2020, INTERPOL measured the impact of COVID-19 on cybercrime. The results reveal that while the primary targets of cyberattacks usually remain individuals and SMEs, these have significantly expanded to large organizations and governments during the COVID period, revealing a new underlying trend. The fact that working from home was massively implemented has obviously increased vulnerabilities which cybercriminals have been able to ... Read More

The importance of reverse DNS

Image source : Jonbonsilver via Pixabay Reverse DNS is often unknown to domain name managers, especially when the names are hosted by major hosting companies. Reverse DNS allows you to resolve from an IP address to an FQDN. This is the exact opposite of the classic use of DNS, which associates domain names to IP addresses. The reverse DNS allows to answer the question: I have an IP address, what is the FQDN related to it? Reverse DNS operates by creating a reverse DNS zone in which DNS PT... Read More

Companies’ cybersecurity – 5th edition of CESIN’s annual barometer

Image source: TheDigitalArtist via Pixabay Every year, the Club of Experts in Information and Digital Security (CESIN) publishes its barometer of companies’ cybersecurity in order to better understand the perception and concrete reality of cybersecurity and its issues within CESIN member companies. Last January, CESIN unveiled the results of its OpinionWay survey, carried out from the 2nd of December 2019 to the 7th of January 2020 among its 253 members, Chief Information Security Officer... Read More

Let’s Encrypt, do not confuse confidentiality and security

Let’s Encrypt was recently the subject of discussions in the small world of TLS certificates, by suddenly revoking 3 048 289 certificates which should not have been issued. A bug in its validation software prevented CAA registrations controls, and the certificates in question should not have been initially issued. These significant disruptions resulted from this mass revocation, but it is difficult to complain about a free service. I am often asked what I think of Let’s Encrypt, an... Read More