{"id":9146,"date":"2017-09-07T08:10:12","date_gmt":"2017-09-07T16:10:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/07\/news-2919\/"},"modified":"2017-09-07T08:10:12","modified_gmt":"2017-09-07T16:10:12","slug":"news-2919","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/07\/news-2919\/","title":{"rendered":"Google reminds website owners to move to HTTPS before October deadline"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 07 Sep 2017 15:36:57 +0000<\/strong><\/p>\n<p>With the release of Chrome v62 in less than 3 months, Google will begin marking non-HTTPS pages with text input fields\u2014like contact forms and search bars\u2014and all HTTP websites viewed in Incognito mode as &#8220;NOT SECURE&#8221; in the address bar.\u00a0The company has started sending out warning emails to web owners in August as a follow-up to <a href=\"https:\/\/security.googleblog.com\/2017\/04\/next-steps-toward-more-connection.html\" target=\"_blank\" rel=\"noopener\">an announcement by Emily Schechter<\/a>, Product Manager of Chrome\u00a0Security Team, back in April.<\/p>\n<p>Google began marking sites in\u00a0<a href=\"https:\/\/security.googleblog.com\/2016\/09\/moving-towards-more-secure-web.html\" target=\"_blank\" rel=\"noopener\">Chrome v56<\/a>, which was issued in January of this year. They targeted HTTP sites that collect user passwords and credit card details.<\/p>\n<p>For owners to secure the information being shared among their visitors and their web server, they must start incorporating an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public_key_certificate#TLS.2FSSL_server_certificate\" target=\"_blank\" rel=\"noopener\">SSL certificate<\/a>. Failing to do this is risky for both parties: sites that allow the sending of information in clear text may also allow its exposure through the\u00a0Internet.<\/p>\n<p>Ms. Schechter also provided website owners with <a href=\"https:\/\/developers.google.com\/web\/fundamentals\/security\/encrypt-in-transit\/enable-https?hl=en\" target=\"_blank\" rel=\"noopener\">a handy guide on how to enable HTTPS<\/a> on their servers. An additional\u00a0guideline on <a href=\"https:\/\/developers.google.com\/web\/updates\/2016\/10\/avoid-not-secure-warn\" target=\"_blank\" rel=\"noopener\">how to avoid the &#8220;NOT SECURE&#8221; warning on Chrome<\/a> is also available for web developers.<\/p>\n<p>Looking at the way things are panning out, we can be confident that HTTPS will be the norm in no time. However, this doesn&#8217;t mean that all sites using SSL certificates can and should be trusted.<\/p>\n<p>Google intended to separate <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/phishing\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> sites from legitimate ones with the marking of insecure sites, as Help Net Security\u00a0<a href=\"https:\/\/www.helpnetsecurity.com\/2017\/05\/19\/number-https-phishing-sites-triples\/\" target=\"_blank\" rel=\"noopener\">noted<\/a>\u00a0in an article. Unfortunately, the introduction of new browser versions capable of flagging sites also promptly introduced <a href=\"https:\/\/news.netcraft.com\/archives\/2017\/05\/17\/phishing-sites-react-promptly-to-new-browser-changes.html\" target=\"_blank\" rel=\"noopener\">more phishing sites using HTTPS<\/a>. We&#8217;ve been seeing examples of this in the wild, as well, the latest of which was an <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/apple-phish-summary-report-statement\/\" target=\"_blank\" rel=\"noopener\">Apple phishing campaign<\/a>.<\/p>\n<p>Discerning phishing pages from the real ones has\u00a0become more challenging than ever. This is why it&#8217;s important for users to familiarize themselves with other signs that they might be on a phishing page apart from the lack of SSL certificates. Fortunately, users don&#8217;t have to look far from the address bar when they want to double-check that they&#8217;re on the right page before entering their credentials or banking details. Keep in mind the following when scrutinizing URLs and other elements around it:<\/p>\n<ul>\n<li>Look for letters in the URL that may have been made to look like another letter or number, or there may be additional letters or numbers in the URL. For example, examplewebsite.com may appear as examplevvebsite.com\u2014Catch that? The double &#8216;v&#8217; together makes it look like the letter &#8216;w.&#8217; This is an example of\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/typosquatting\/\" target=\"_blank\" rel=\"noopener\">typosquatting<\/a>. Here&#8217;s another example: examp1ewebsite.com\u2014the &#8216;l&#8217; in &#8220;example&#8221; is actually the number one.<\/li>\n<li>Look for an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Extended_Validation_Certificate\" target=\"_blank\" rel=\"noopener\">Extended Validation Certificate (EV SSL)<\/a>. You know that a trusted website has this when you see a company name beside the URL, as you can see from the below UK Paypal address. Not all sites with SSL have this, unfortunately, but some of the trusted brands online already use EV SSL, such as Bank of America, eBay, Apple, and Microsoft.<br \/> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19610 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/EV-SSL.png\" alt=\"\" width=\"335\" height=\"40\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/EV-SSL.png 335w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/EV-SSL-300x36.png 300w\" sizes=\"auto, (max-width: 335px) 100vw, 335px\" \/><\/li>\n<\/ul>\n<p>Lastly, be aware that phishers may use a free SSL certificate in their campaign to make it appear legitimate. They may also hijack sites that already have SSL in place, adding more to the veil of legitimacy they want to attain.<\/p>\n<p>Other related posts:<\/p>\n<ul>\n<li>Phishing 101: <a href=\"https:\/\/blog.malwarebytes.com\/101\/2012\/06\/phishing-101-part-1\/\" target=\"_blank\" rel=\"noopener\">Part 1<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/101\/2012\/07\/phishing-101-part-2\/\" target=\"_blank\" rel=\"noopener\">Part 2<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2012\/07\/phishing-101-part-3\/\" target=\"_blank\" rel=\"noopener\">Part 3<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/10\/the-growing-threat-from-phishing\/\" target=\"_blank\" rel=\"noopener\">The growing threat of phishing<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener\">Something\u2019s phishy: How to detect phishing attempts<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>The Malwarebytes Labs<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/09\/google-reminds-website-owners-to-move-to-https-before-october-deadline\/\">Google reminds website owners to move to HTTPS before October deadline<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/09\/google-reminds-website-owners-to-move-to-https-before-october-deadline\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 07 Sep 2017 15:36:57 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2017\/09\/google-reminds-website-owners-to-move-to-https-before-october-deadline\/' title='Google reminds website owners to move to HTTPS before October deadline'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/shutterstock_640739344.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>To encourage website owners and service providers to move to HTTPS, Google began sending out emails to remind them that their sites will be marked as insecure if they don&#8217;t comply. This is the latest step in the search giant&#8217;s long-term effort of creating a safer web experience for every user.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ev-ssl\/\" rel=\"tag\">ev ssl<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/extended-validation-certificate\/\" rel=\"tag\">extended validation certificate<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/https\/\" rel=\"tag\">HTTPS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ssl-certificate\/\" rel=\"tag\">ssl certificate<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2017\/09\/google-reminds-website-owners-to-move-to-https-before-october-deadline\/' title='Google reminds website owners to move to HTTPS before October deadline'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/09\/google-reminds-website-owners-to-move-to-https-before-october-deadline\/\">Google reminds website owners to move to HTTPS before October deadline<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,14507,14508,10520,1670,11124,3924,12283],"class_list":["post-9146","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-ev-ssl","tag-extended-validation-certificate","tag-fyi","tag-google","tag-https","tag-phishing","tag-ssl-certificate"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9146"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9146\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9146"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}