#whois

[ follow ]
#cybersecurity
Ars Technica
1 week ago
Privacy professionals

Google calls for halting use of WHOIS for TLS domain verifications

Threat actors can exploit WHOIS data verification to fraudulently obtain TLS certificates, prompting calls for a reevaluation of verification practices. [ more ]
Ars Technica
2 weeks ago
Privacy professionals

Rogue WHOIS server gives researcher superpowers no one should ever have

The acquisition of an expired domain allowed security researcher Benjamin Harris to demonstrate significant vulnerabilities within WHOIS registration and TLS certificate processes. [ more ]
Ars Technica
1 week ago
Privacy professionals

Google calls for halting use of WHOIS for TLS domain verifications

Threat actors can exploit WHOIS data verification to fraudulently obtain TLS certificates, prompting calls for a reevaluation of verification practices. [ more ]
Ars Technica
2 weeks ago
Privacy professionals

Rogue WHOIS server gives researcher superpowers no one should ever have

The acquisition of an expired domain allowed security researcher Benjamin Harris to demonstrate significant vulnerabilities within WHOIS registration and TLS certificate processes. [ more ]
morecybersecurity
[ Load more ]