The next-generation SSL technology will counteract phishing attacks, the company says.
a provider of secure sockets layer certificates, is offering extended validation SSL certificates that are detectable by Windows XP to help Internet users battle phishing attacks.
When consumers use an EV SSL-aware browser, valid sites will feature a green address bar, and information about the company operating the site and the certification authority that issued the certificate will be displayed, Entrust officials said. The EV SSL certificates will still be recognized by older browser versions that are not EV SSL-aware, officials said. Although older browsers will not display the company nameor a green background address bara closed padlock will still be present, officials said.
Click here to read more about SSL filtering.
Extended validation refers to industry standard validation methods used by a certification authority before a certificate is issued. Validation SSL Server Certificates are part of a new category of SSL certificates created by CA/Browser Forum to combat phishing attacks, and are issued to Web sites only after completion of the new validation process.
"In a constant battle against identity theft, Entrust stands behind the new EV SSL Certificate technology and is making it available to organizations via a number of efficient methods," said Entrust chairman, president and chief executive officer Bill Conner in a statement.
"Because the new technology makes valid sites easier to detect, it becomes very difficult for fraudsters to target innocent consumers with sophisticated phishing attacks, as well as helping to protect the brand, reputation and resources of legitimate organizations that can be negatively affected."
Windows XP and Windows Vista users with the latest version of Internet Explorer 7 can see the new EV SSL certificates in action
and purchase them online.
Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.