SlideShare une entreprise Scribd logo
1  sur  25
Shift to HTTPS and Save Your Website
from the Wrath of Blacklisting
Shift to HTTPS and Save Your Website
from the Wrath of Blacklisting
Abstract
1. Understanding ‘Blacklisting’
2. Recent Developments
3. Why Blacklisting?
4. Avoid blacklisting by embracing HTTPS
5. What is an SSL certificate? What does it do?
6. Benefits of SSL Certificate Installation
7. Final Verdict
A recent report suggests Google is blacklisting non-HTTPS sites asking for login credentials.
Understanding
‘Blacklisting’
Let’s understand Blacklisting in Details
1
▪ Being the top search engine in the world places some serious accountability on Google’s
shoulders. It means constant development and optimization of modern technologies, tools,
and techniques to keep cyber attackers at bay.
▪ Blacklisting demonstrates one of the best examples of it.
▪ Fundamentally, Blacklisting is a defense mechanism used to prevent web surfers from
visiting a potentially dangerous webpage/website.
▪ Safe Browsing, a tool developed by Google does this job. Safe Browsing scans millions of
websites and identifies possibly dangerous ones. Then Google raises a red flag by displaying
‘The site ahead contains harmful programs.’ This is shown in the image below:
As a part of this blacklisting process, Google eliminates such website from its search engine index
itself, thus making it impossible to access it directly from the search engine. More than anything, the
traffic of the website is impacted the greatest. It is estimated that a blacklisted website loses around
95% of its organic traffic.
Recent
Developments
Let’s understand Recent Developments in
Details
2
Recent Developments
▪ Until recently, these security warnings were limited to sites containing mischievous
programs.
▪ Not anymore. Going by the report published by security firm Sucuri, Google has
started flagging non-HTTPS websites that ask for usernames and passwords.
▪ This move is enforced in order to protect the credentials being sent by the client to
the server.
▪ This move is a positive step taken in Google’s long-standing goal of enabling HTTPS all
over the internet.
• Google is not alone in this quest. Mozilla made an identical announcement for its
browser Firefox.
• Under which, Firefox will display a gray lock with a red slash for the non-HTTPS sites
containing password field as shown in the image below:
Why
Blacklisting?3
Blacklisting?
Web-browsing is an Achilles’ Heel as far as the security of users is concerned.
It is an easy target for online fraudsters to trick users using deceiving files and
links. This is where Blacklisting enters the scene. On seeing warnings raising
concerns over the safety of a website, the user is bound to think twice before
visiting the site.
Avoid
blacklisting by
embracing
HTTPS
4
▪ Google’s love for HTTPS is not a secret to
anyone. Since the mission “HTTPS
Everywhere” was announced, slowly but
steadily Google started putting restrictions
on non-HTTPS websites. The blacklisting of
non-HTTPS websites is another stepping
stone in the tech giant’s great vision.
How to Avoid blacklisting
by embracing HTTPS?
▪ The report published by Sucuri last week
gives some wonderful insights into the
recent developments implemented by
Google. They reported a rise in the number
of blacklisted sites for no reason. The
blacklisted sites were “clean” in their terms.
They reported some of the blacklist review
requests were cleared “only after SSL was
enabled.” As mentioned, SSL certificate
installation is required to get HTTPS
protocol enabled on your website.
What is an SSL
certificate?
What does it
do?
5
What is an SSL certificate?
What does it do?
▪ In Layman’s terms, an SSL
certificate is a modern, digital
form of an envelope seal. With a
countless number of users
sharing their delicate, confidential
information on websites, there is
a need to protect such data from
coming into the hands of cyber
criminals. This is what SSL
certificates are intended to fix
and that is exactly what they do.
▪ On an SSL-enabled website,
every tiny bit of data shared by
users is transformed into an
undecipherable strand of
numbers, alphabets, and special
characters. This conversion from
an original format to unreadable
from is referred as Encryption.
▪ In the wake of this
conversion, it is an effectively
unthinkable task for any
cyber attacker to decipher,
read, and tamper the
information. As a result of
SSL installation, trust
indicators such as padlock
and green address bar are
enabled on the website.
Benefits of
SSL Certificate
Installation6
Benefits of SSL Certificate
Installation ▪ Without a shadow of a doubt,
the central idea behind the
SSL installation is the
protection of your site’s
visitors’ data. However, this is
just the tip of the iceberg. The
adoption of HTTPS offers
numerous improvements over
HTTP.
1. Google Ranking
▪ In 2014 Google declared to give
advantage to HTTPS enabled
websites in terms of search engine
rankings
2. Malware Scanning & Vulnerability Assessment
▪ Some of the SSL certificate brands offer tools such as malware scanning and
vulnerability assessment. These tools can be of immense help to prevent your site
from being infected by viruses and malware
3. Customer Trust
▪ As far as the customer trust is concerned, the trust signs prove to be a key factor
4. Boost up Business Conversation
▪ For business sites, with improved trust from customers, there are fewer abandoned carts,
which increases order conversion percentage
5. Eliminate phishing attacks
▪ SSL certificates help prevent phishing attacks
Final Verdict
7 ▪ Whether you agree or not, SSL is the way
forward. The only question is–whether you want
to be a part of this wonderful change and reap
the fruits now or you want to regret not doing it
sooner.
Blog:
cheapsslsecurity.com/blog
Facebook:
CheapSSLSecurities
Twitter: SSLSecurity
Google Plus:
+Cheapsslsecurity
For more details on HTTPS
and website Blacklisting

Contenu connexe

Tendances

F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
F5 Networks
 
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL CertificatesHashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Nick Maludy
 

Tendances (20)

Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
 
Azlan Security Offering
Azlan Security OfferingAzlan Security Offering
Azlan Security Offering
 
Recipe for good secrets management
Recipe for good secrets managementRecipe for good secrets management
Recipe for good secrets management
 
SSL f or WordPress Websites
SSL f or WordPress WebsitesSSL f or WordPress Websites
SSL f or WordPress Websites
 
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL CertificatesHashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp VaultCodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
CodiLime Tech Talk - Michał Pawluk: Our deployment of HashiCorp Vault
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
 
State of the Web
State of the WebState of the Web
State of the Web
 
Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architectures
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Introduction to vault
Introduction to vaultIntroduction to vault
Introduction to vault
 
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
 
Chapter1:information security overview
Chapter1:information security overview Chapter1:information security overview
Chapter1:information security overview
 
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
 
ACME and Let's Encrypt: HTTPS made easy
ACME and Let's Encrypt: HTTPS made easyACME and Let's Encrypt: HTTPS made easy
ACME and Let's Encrypt: HTTPS made easy
 
3441355 ln motileng_ssl_report
3441355 ln motileng_ssl_report3441355 ln motileng_ssl_report
3441355 ln motileng_ssl_report
 
SSL overview
SSL overviewSSL overview
SSL overview
 

Similaire à Shift to HTTPS and Save Your Website from the Wrath of Blacklisting

CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
Wavecrest Computing
 
Is web security part of your annual security audit
Is web security part of your annual security auditIs web security part of your annual security audit
Is web security part of your annual security audit
Dianne Douglas
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
Justyna Majek
 

Similaire à Shift to HTTPS and Save Your Website from the Wrath of Blacklisting (20)

What you need to know about Google Chrome 56?
What you need to know about Google Chrome 56?What you need to know about Google Chrome 56?
What you need to know about Google Chrome 56?
 
Google Chrome 56 What You Need to Know?
Google Chrome 56   What You Need to Know?Google Chrome 56   What You Need to Know?
Google Chrome 56 What You Need to Know?
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
Discover the Best Free Web Hosting Services with SSL Included
Discover the Best Free Web Hosting Services with SSL IncludedDiscover the Best Free Web Hosting Services with SSL Included
Discover the Best Free Web Hosting Services with SSL Included
 
Designing and Implementing a Secure, Fully Brandable Web Portal
Designing and Implementing a Secure, Fully Brandable Web PortalDesigning and Implementing a Secure, Fully Brandable Web Portal
Designing and Implementing a Secure, Fully Brandable Web Portal
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
 
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO
 
The Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL CertificatesThe Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL Certificates
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
 
Is web security part of your annual security audit
Is web security part of your annual security auditIs web security part of your annual security audit
Is web security part of your annual security audit
 
The Technical Side of Websites
The Technical Side of WebsitesThe Technical Side of Websites
The Technical Side of Websites
 
Understanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdfUnderstanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdf
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
 
Role of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure securityRole of blockchain technology in critical infrastructure security
Role of blockchain technology in critical infrastructure security
 
How Does SSL Affect Your Search Engine Optimization
How Does SSL Affect Your Search Engine OptimizationHow Does SSL Affect Your Search Engine Optimization
How Does SSL Affect Your Search Engine Optimization
 
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...
 

Plus de CheapSSLsecurity

Plus de CheapSSLsecurity (20)

What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
TLS 1.3: Everything You Need to Know - CheapSSLsecurityTLS 1.3: Everything You Need to Know - CheapSSLsecurity
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
 
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH ErrorHow to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
 
Apache Server: Common SSL Errors and Troubleshooting Guide
Apache Server: Common SSL Errors and Troubleshooting GuideApache Server: Common SSL Errors and Troubleshooting Guide
Apache Server: Common SSL Errors and Troubleshooting Guide
 
Multi Domain Wildcard Features explained by CheapSSLsecurity
Multi Domain Wildcard Features explained by CheapSSLsecurityMulti Domain Wildcard Features explained by CheapSSLsecurity
Multi Domain Wildcard Features explained by CheapSSLsecurity
 
Various Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and KeytoolVarious Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and Keytool
 
What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out for
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains SecurityThawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
 
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerceWhy Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
 
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurityComodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
 
Reduce the Domain Validation time with Symantec Automated Authentication Process
Reduce the Domain Validation time with Symantec Automated Authentication ProcessReduce the Domain Validation time with Symantec Automated Authentication Process
Reduce the Domain Validation time with Symantec Automated Authentication Process
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Shift to HTTPS and Save Your Website from the Wrath of Blacklisting

  • 1. Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
  • 2. Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
  • 3. Abstract 1. Understanding ‘Blacklisting’ 2. Recent Developments 3. Why Blacklisting? 4. Avoid blacklisting by embracing HTTPS 5. What is an SSL certificate? What does it do? 6. Benefits of SSL Certificate Installation 7. Final Verdict
  • 4. A recent report suggests Google is blacklisting non-HTTPS sites asking for login credentials.
  • 6. ▪ Being the top search engine in the world places some serious accountability on Google’s shoulders. It means constant development and optimization of modern technologies, tools, and techniques to keep cyber attackers at bay. ▪ Blacklisting demonstrates one of the best examples of it. ▪ Fundamentally, Blacklisting is a defense mechanism used to prevent web surfers from visiting a potentially dangerous webpage/website. ▪ Safe Browsing, a tool developed by Google does this job. Safe Browsing scans millions of websites and identifies possibly dangerous ones. Then Google raises a red flag by displaying ‘The site ahead contains harmful programs.’ This is shown in the image below:
  • 7. As a part of this blacklisting process, Google eliminates such website from its search engine index itself, thus making it impossible to access it directly from the search engine. More than anything, the traffic of the website is impacted the greatest. It is estimated that a blacklisted website loses around 95% of its organic traffic.
  • 9. Recent Developments ▪ Until recently, these security warnings were limited to sites containing mischievous programs. ▪ Not anymore. Going by the report published by security firm Sucuri, Google has started flagging non-HTTPS websites that ask for usernames and passwords. ▪ This move is enforced in order to protect the credentials being sent by the client to the server. ▪ This move is a positive step taken in Google’s long-standing goal of enabling HTTPS all over the internet.
  • 10. • Google is not alone in this quest. Mozilla made an identical announcement for its browser Firefox. • Under which, Firefox will display a gray lock with a red slash for the non-HTTPS sites containing password field as shown in the image below:
  • 12. Blacklisting? Web-browsing is an Achilles’ Heel as far as the security of users is concerned. It is an easy target for online fraudsters to trick users using deceiving files and links. This is where Blacklisting enters the scene. On seeing warnings raising concerns over the safety of a website, the user is bound to think twice before visiting the site.
  • 14. ▪ Google’s love for HTTPS is not a secret to anyone. Since the mission “HTTPS Everywhere” was announced, slowly but steadily Google started putting restrictions on non-HTTPS websites. The blacklisting of non-HTTPS websites is another stepping stone in the tech giant’s great vision. How to Avoid blacklisting by embracing HTTPS? ▪ The report published by Sucuri last week gives some wonderful insights into the recent developments implemented by Google. They reported a rise in the number of blacklisted sites for no reason. The blacklisted sites were “clean” in their terms. They reported some of the blacklist review requests were cleared “only after SSL was enabled.” As mentioned, SSL certificate installation is required to get HTTPS protocol enabled on your website.
  • 15. What is an SSL certificate? What does it do? 5
  • 16. What is an SSL certificate? What does it do? ▪ In Layman’s terms, an SSL certificate is a modern, digital form of an envelope seal. With a countless number of users sharing their delicate, confidential information on websites, there is a need to protect such data from coming into the hands of cyber criminals. This is what SSL certificates are intended to fix and that is exactly what they do. ▪ On an SSL-enabled website, every tiny bit of data shared by users is transformed into an undecipherable strand of numbers, alphabets, and special characters. This conversion from an original format to unreadable from is referred as Encryption. ▪ In the wake of this conversion, it is an effectively unthinkable task for any cyber attacker to decipher, read, and tamper the information. As a result of SSL installation, trust indicators such as padlock and green address bar are enabled on the website.
  • 18. Benefits of SSL Certificate Installation ▪ Without a shadow of a doubt, the central idea behind the SSL installation is the protection of your site’s visitors’ data. However, this is just the tip of the iceberg. The adoption of HTTPS offers numerous improvements over HTTP.
  • 19. 1. Google Ranking ▪ In 2014 Google declared to give advantage to HTTPS enabled websites in terms of search engine rankings
  • 20. 2. Malware Scanning & Vulnerability Assessment ▪ Some of the SSL certificate brands offer tools such as malware scanning and vulnerability assessment. These tools can be of immense help to prevent your site from being infected by viruses and malware
  • 21. 3. Customer Trust ▪ As far as the customer trust is concerned, the trust signs prove to be a key factor
  • 22. 4. Boost up Business Conversation ▪ For business sites, with improved trust from customers, there are fewer abandoned carts, which increases order conversion percentage
  • 23. 5. Eliminate phishing attacks ▪ SSL certificates help prevent phishing attacks
  • 24. Final Verdict 7 ▪ Whether you agree or not, SSL is the way forward. The only question is–whether you want to be a part of this wonderful change and reap the fruits now or you want to regret not doing it sooner.