Though it has been talked about many times before, several sites, including Slashdot, continue to discuss whether Firefox 3 handles invalid SSL certificates in the right way.
The Google Security Team has developed and released an open source cryptographic toolkit that makes it easier and safer for developers to use cryptography in their applications.
VeriSign has posted about a statistic that means good news for EV certificates and consumers in general: Over 50% of browsers can now use EV SSL Certificates
Johnathan Nightingale, a user interface developer for Firefox, has responded to the criticisms of the way that self-signed certificates are handled in Firefox 3.
The recent news about a DNS flaw discovered by Dan Kaminsky has been highly publicized and the details of the flaw have even been released. How does this new flaw open up phishing attacks using Domain Validated SSL Certificates?
Mike Fratto posted an article in Information Week about how EV certificates don't increase trust. He claims that they only help line the pockets of certificate authorities like VeriSign.
The details of the new DNS attack discovered by Dan Kaminsky were recently leaked. Make sure you are safe by checking whether your ISP's DNS servers are vulnerable.
Nat Tuck Thu has posted about how Mozilla's policy of displaying harsh warning when a site uses an untrusted certificate is causing many sites to not use SSL when they should be.
GlobalSign leading provider of online security solutions, has announced "AutoCSR" and "One-Click SSL" two new SSL deployment technologies that will revolutionize the way hosting companies provision SSL Certificates to hosting customers.
The Slashdot crowd has opened a discussion about the possibility of a free, open Certificate Authority. A few pointed out the currently free alternative CAs and their problems while many brought it back to the purpose of SSL and a Public Key Infrastructure.