{"id":10137,"date":"2019-02-28T09:00:45","date_gmt":"2019-02-28T09:00:45","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=10137"},"modified":"2020-01-07T06:10:27","modified_gmt":"2020-01-07T06:10:27","slug":"ssl-scam-a-form-of-internet-scam-esds-vtmscan","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/ssl-scam-a-form-of-internet-scam-esds-vtmscan\/","title":{"rendered":"SSL SCAM: A FORM OF INTERNET SCAM \u2013 ESDS VTMScan"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">The internet contributes significantly to people\u2019s lives these days, whereas the lives of some people evolve with time around the web. However, not everything on the internet seems real or seems as it is.<br>Just as the filmmakers use sophisticated tricks, manipulations, and effects to get us to believe that the action is real, so also there are numerous websites on the internet which are using a lot of tricks and great range promises to get the internet user part way with their cash or information for fraudulent acts.<br>The internet is full of websites that appear real on the surface but beneath it, its fake, fraudulent and scam -a ploy to fraud people<\/p><\/p>\n\n\n\n<p style=\"text-align: justify;\">The evolution of the internet has brought with it numerous extremely convenient advances and powerfully shaped our manner of livelihood. The world is a global village. At the same time, the evolution of the internet has also given way to new risks and methodologies to prey on internet users \u2014new avenues for online scammers to rip off the unsuspecting users<\/p>\n\n\n\n<p style=\"text-align: justify;\">With the geometrical growth in online services and internet use, accompanied by tremendous benefits has been a series of opportunities outlets for criminals to commit scams and fraud. These are fraudulent schemes that seek to take advantage and prey on unsuspecting users to gain a benefit (such as money, or access to identities)<\/p>\n\n\n\n<p style=\"text-align: justify;\">The&nbsp;<strong>Secure Socket Layer<\/strong>&nbsp;protocol (SSL) was the initial implementation to protect internet users on websites. However, it has been currently implemented as TLS.<br>TLS is an encryption protocol used to protect HTTP connections on the Web so that the website users can securely exchange information and use the website for financial purposes such as accessing bank details, passwords to classified information\u2019s<\/p>\n\n\n\n<p style=\"text-align: justify;\">TLS is of particular interest for online financial transactions, such as online shopping but is also essential for logins, to ensure that eavesdroppers cannot harvest usernames and passwords in unencrypted network traffic, then hack accounts<\/p>\n\n\n\n<p style=\"text-align: justify;\">To the untrained eye, it\u2019s almost impossible to tell a fake site from the real one. Hackers clone an actual website to create a fake one with a high level of correlations. This tactic could be used to steal financial information or medical data<\/p>\n\n\n\n<p style=\"text-align: justify;\">Series of service providers helps forestall their customers from being a victim of a scam by issuing server certificates to authenticate a Web server. It is a protective cover made out of band certificates to the client system to cut off any middle attacks. The method by which the CAs make their registration and verification systems available is known as PKI or Public Key Infrastructure<\/p>\n\n\n\n<p><strong>MTvscan cuts off scamming activities on customer\u2019s website by running SSL Scan:<\/strong><\/p>\n\n\n\n<p>\u2022 This is a check for SSL Poodle, BEAST, CRIME, Heartbleed, DROWN, etc<\/p>\n\n\n\n<p>I<strong>t goes deep in SSL Check, by accessing the following areas prone to SSL scam:<\/strong><\/p>\n\n\n\n<p>\u2022 Using NULL Cipher or Cipher less than 128 bits.<br>\u2022 Check for Domain with an invalid security certificate.<br>\u2022 Domain with an expired security certificate.<br>\u2022 Domain with a security certificate, expiring today (EOD).<\/p>\n\n\n\n<p>All this information is what the\u00a0<strong><a href=\"https:\/\/esds.co.in\/security\/vtmscan\">ESDS VTMScan<\/a><\/strong>\u00a0looks out for on a website<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet contributes significantly to people\u2019s lives these days, whereas the lives of some people evolve with time around the web. However, not everything on the internet seems real or seems as it is.Just as the filmmakers use sophisticated tricks, manipulations, and effects to get us to believe that the action is real, so also&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/ssl-scam-a-form-of-internet-scam-esds-vtmscan\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":81,"featured_media":10150,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[1908,1966,1914,511,1960,1967,1203,1968,1961,1962,1963],"class_list":["post-10137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-cyber-security","tag-domain-blacklisting","tag-esds-vtmscan","tag-security","tag-security-scanner","tag-security-scanner-for-website","tag-ssl","tag-ssl-scam","tag-ssl-scan","tag-ssl-scanner","tag-ssl-server-test"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=10137"}],"version-history":[{"count":5,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10137\/revisions"}],"predecessor-version":[{"id":11117,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10137\/revisions\/11117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/10150"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=10137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=10137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=10137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}