Софт-Архив

Security img-1

Security

Рейтинг: 4.3/5.0 (1830 проголосовавших)

Категория: Windows: Антивирусы

Описание

Security - это

security это:

коллективная безопасность communications

вчт. безопасность хранения данных data

вчт. защита данных data

вчт. надежность хранения данных data

вчт. сохранность данных debt

Смотреть что такое "security" в других словарях:

Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… … Wikipedia

security — se·cur·i·ty /si kyu?r ? te/ n pl ties 1 a: something (as a mortgage or collateral) that is provided to make certain the fulfillment of an obligation used his property as security for a loan b: surety see also … Law dictionary

security — [si kyoor?? te] n. pl. securities [ME securite < L securitas < securus: see SECURE] 1. the state of being or feeling secure; freedom from fear, anxiety, danger, doubt, etc.; state or sense of safety or certainty 2. something that gives or… … English World dictionary

Security — Se*cu ri*ty, n.; pl. . [L. securitas: cf. F. s[ e]curit[ e]. See , and cf. .] 1. The condition or quality of being secure; secureness. Specifically: (a) Freedom from apprehension, anxiety, or care; confidence of power… … The Collaborative International Dictionary of English

security — Something given or pledged to a person who is lending money in order to secure or guarantee payment of that debt. (Dictionary of Canadian Bankruptcy Terms) Under Title 11 U.S.C. Section 101: (49) The term security (A) includes (i) note; (ii)… … Glossary of Bankruptcy

Security — Widefield, CO U.S. Census Designated Place in Colorado Population (2000): 29845 Housing Units (2000): 10177 Land area (2000): 14.522255 sq. miles (37.612466 sq. km) Water area (2000): 0.493456 sq. miles (1.278046 sq. km) Total area (2000):… … StarDict's U.S. Gazetteer Places

security — (n.) mid 15c. condition of being secure, from L. securitas, from securus (see SECURE (Cf. secure)). Meaning freedom from care is from 1550s; that of something which secures is from 1580s; safety of a state, person, etc. is from 1941. Legal sense … Etymology dictionary

security — [n1] safety, protection aegis, agreement, armament, armor, asylum, bail, bond, care, collateral, compact, contract, covenant, cover, custody, defense, earnest, freedom, guarantee, guard, immunity, insurance, pact, pawn, pledge, precaution,… … New thesaurus

security — surety, guaranty, *guarantee, bond, bail Analogous words: *pledge, earnest, token … New Dictionary of Synonyms

security — > NOUN (pl. securities) 1) the state of being or feeling secure. 2) the safety of a state or organization against criminal activity such as terrorism or espionage. 3) a thing deposited or pledged as a guarantee of the fulfilment of an undertaking … English terms dictionary

security — Common or preferred stock; a bond of a corporation, government, or quasi government body. Chicago Board of Trade glossary Piece of paper that proves ownership of stocks, bonds, and other investments. Bloomberg Financial Dictionary Amount that… … Financial and business terms

  • The Law of Secured Finance. An International Survey of Security Interests Over Personal Property. Ali Paul. The security interest is one of the most important devices used by financiers to manage credit risk. A financier that holds a security interest over the assets of a debtor enjoys considerable… Подробнее Купить за 21556 руб
  • LTE Security. Dan Forsberg. Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security.… Подробнее Купить за 2961 руб
  • Authoritative Computer&Network Security Dictionary. Daniel Minoli. This is a dictionary and handbook that defines the field and provides unique insight. Turn to"Minoli-Cordovana's Authoritative Computer and Network Security Dictionary"for clear, concise, and… Подробнее Купить за 1288 руб
Другие книги по запросу «security» >>

Другие статьи, обзоры программ, новости

Security

Simple Definition of security

. the state of being protected or safe from harm

. things done to make people or places safe

. the area in a place (such as an airport) where people are checked to make sure they are not carrying weapons or other illegal materials

Full Definition of security

plural se·cu·ri·ties

1.   the quality or state of being secure. as a.   freedom from danger.   safety b.   freedom from fear or anxiety c.   freedom from the prospect of being laid off <job security >

2 a.   something given, deposited, or pledged to make certain the fulfillment of an obligation b.   surety

3.   an instrument of investment in the form of a document (as a stock certificate or bond) providing evidence of its ownership

4 a.   something that secures.   protection b (1).   measures taken to guard against espionage or sabotage, crime, attack, or escape (2).   an organization or department whose task is security

Security - definition of security by The Free Dictionary

se•cu•ri•ty

12. pertaining to security: strict security measures.

[1400–50; late Middle English securytye, securite(e) < Latin sēcūritās ]

  • hostage - First referred to the state of someone handed over as a pledge or security (for the fulfillment of an undertaking).
  • policy - Meaning "insurance document," it is from a French word meaning "certificate, contract," from an earlier Latin word meaning "a receipt or security for money paid."
  • impignorate. pignorate - To impignorate or pignorate means to put up as security or to pawn.
  • wage. wager - Wage once meant "pledge, security" and wager was defined as "solemn pledge" or "undertaking," from French wagier, "to pledge."

1. Measures taken by a military unit, activity, or installation to protect itself against all acts designed to, or which may, impair its effectiveness.

to increase security → augmenter la securite

Security Definition

BREAKING DOWN 'Security'

Securities are typically divided into debts and equities. A debt security represents money that is borrowed and must be repaid, with terms that define the amount borrowed, interest rate and maturity/renewal date. Debt securities include government and corporate bonds, certificates of deposit (CDs). preferred stock and collateralized securities (such as CDOs ? and CMOs ?).

Equities represent ownership interest held by shareholders in a corporation, such as a stock. Unlike holders of debt securities who generally receive only interest and the repayment of the principal, holders of equity securities are able to profit from capital gains .

In the United States, the U.S. Securities and Exchange Commission (SEC) and other self-regulatory organizations (such as the Financial Industry Regulatory Authority (FINRA) ) regulate the public offer and sale of securities.

The entity (usually a company) that issues securities is known as the issuer. For example, the issuer of a bond issue may be a municipal government raising funds for a particular project. Investors of securities may be retail investors–those who buy and sell securities on their own behalf and not for an organization–and wholesale investors–financial institutions acting on behalf of clients or acting on their own account. Institutional investors include investment banks, pension funds, managed funds and insurance companies.

Security Functions

Generally, securities represent an investment and a means by which companies and other commercial enterprises can raise new capital. Companies can generate capital through investors who purchase securities upon initial issuance. Depending on an institution's market demand or pricing structure, raising capital through securities can be a preferred alternative to financing through a bank loan.

On the other hand, purchasing securities with borrowed money, an act known as buying on a margin. is a popular investment technique. In essence, a company may deliver property rights, in the form of cash or other securities, either at inception or in default, to pay its debt or other obligation to another entity. These collateral arrangements have seen growth especially among institutional investors.

Debts and Equities

Securities can be broadly categorized into two distinct types – debts and equities – although hybrid securities exist as well. Debt securities generally entitle their holder to the payment of principal and interest, along with other contractual rights under the terms of the issue. They are typically issued for a fixed term, at the end of which, they can be redeemed by the issuer. Debt securities only receive principal repayment and interest, regardless of the issuer's performance. They can be protected by collateral or unsecured, and, if unsecured, may be contractually prioritized over other unsecured, subordinated debt in the case of a bankruptcy of the issuer, but do not have voting rights otherwise.

Equity securities refer to a share of equity interest in an entity. This can include the capital stock of a company, partnership or trust. Common stock is a form of equity interest, and capital stock is considered preferred equity as well. Equity securities do not require any payments, unlike debt securities which are typically entitled to regular payments in the form of interest. Equity securities do entitle the holder to some control of the company on a pro rata basis. as well as right to capital gain and profits. This is to say that equity holders maintain voting rights and, thus, some control of the business. In the case of bankruptcy, they share only in residual interest after all obligations have been paid out to creditors.

Hybrid securities. as the name suggests, combine some of the characteristics of both debt and equity securities. Examples of hybrid securities include equity warrants (options issued by the company itself that give holders the right to purchase stock within a certain timeframe and at a specific price), convertibles (bonds that can be converted into shares of common stock in the issuing company) and preference shares  (company stocks whose payments of interest, dividends or other returns of capital can be prioritized over those of other shareholders).

Market Placement

Money for securities in the primary market is typically received from investors during an initial public offering (IPO) by the issuer of the securities. Following an IPO, any newly issued stock, while still sold in the primary market, is referred to as a secondary offering. Alternatively, securities may be offered privately to a restricted and qualified group in what is known as a private placement –an important distinction in terms of both company law and securities regulation. Sometimes a combination of public and private placement is used.

In the secondary market. securities are simply transferred as assets from one investor to another. In this aftermarket, shareholders can sell their securities to other investors for cash or other profit. The secondary market thus supplements the primary by allowing the purchase of primary market securities to result in profits and capital gains at a later time. It is important to note, however, that as private securities are not publicly tradable and can only be transferred among qualified investors, the secondary market is less liquid for privately placed securities.

Securities are often listed on stock exchanges. where issuers can seek security listings and attract investors by ensuring a liquid and regulated market in which to trade. Informal electronic trading systems have become more common in recent years, and securities are now often traded "over the counter ," or directly among investors either online or over the phone. The increased transparency and accessibility of stock prices and other financial data have opened up the markets to these alternative buying and selling options.

Classifications

Certificated securities are those that are represented in physical, paper form. Securities may also be held in the direct registration system, which records shares of stock in book-entry form. In other words, a transfer agent maintains the shares on the company's behalf without the need for physical certificates. Modern technologies and policies have, in some cases, eliminated the need for certificates and for the issuer to maintain a complete security register. A system has developed wherein issuers can deposit a single global certificate representing all outstanding securities into a universal depository known as the Depository Trust Company (DTC). All securities traded through DTC are held in electronic form. It is important to note that certificated and un-certificated securities do not differ in terms of the rights or privileges of the shareholder or issuer.

Bearer securities are those that are negotiable and entitle the shareholder to the rights under the security. They are transferred from investor to investor, in certain cases by endorsement and delivery. In terms of proprietary nature, pre-electronic bearer securities were always divided, meaning each security constituted a separate asset, legally distinct from others in the same issue. Depending on market practice, divided security assets can be fungible or non-fungible, meaning that upon lending, the borrower can return assets equivalent either to the original asset or to a specific identical asset at the end of the loan, though fungible arrangements are certainly more common. In some cases, bearer securities may be used to aid regulation and tax evasion, and thus can sometimes be viewed negatively by issuers, shareholders and fiscal regulatory bodies alike. They are therefore rare in the United States.

Registered securities bear the name of the holder, and the issuer maintains a register of necessary details. Transfers of registered securities occur through amendments to the register. Registered debt securities are always undivided, meaning the entire issue makes up one single asset, with each security being a part of the whole. Undivided securities are fungible by nature. Secondary market shares are also always undivided.

Regulation

Public offerings, sales and trades of securities in the United States must be registered and filed with the SEC state securities departments. Self Regulatory Organizations (SROs) within the brokerage industry are meant to take on regulatory positions as well. Examples of SROs include the National Association of Securities Dealers (NASD) and the Financial Industry Regulatory Authority (FINRA).

Intel Security-McAfee—Antivirus, Encryption, Firewall, Email Security, Web Security, Network Security

For Businesses

Intel Security solutions deliver the highest levels of threat visibility and antimalware protection, including comprehensive system and endpoint protection. network security. cloud security, database security. and data protection. Our complete security solutions extend beyond virus software and antimalware protection to server security. SIEM. and intrusion prevention systems (IPS). Backed by McAfee Global Threat Intelligence, our solutions help companies enhance visibility into their security postures, allowing business to embrace virtualization, cloud services, and mobile devices, while protecting critical assets and sensitive data, and improving incident response .

Our industry-leading security offerings include:

  • McAfee Complete Endpoint Protection. Advanced endpoint security with antivirus, antispam, anti-malware, whitelisting, web security, and desktop firewall works across Windows, Macs, smartphones, tablets, and virtual systems.
  • McAfee SIEM. Bringing together event, threat, and risk data, McAfee SIEM solutions provide real-time visibility into all security activities to improve compliance management and speed up incident response times.
  • McAfee Threat Intelligence Exchange. Get immediate visibility into the presence of advanced targeted attacks and optimize threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
  • McAfee Network Security Platform (IPS). Our best-in-class intrusion prevention system delivers real-time defenses against known, zero-day, denial-of-service (DoS), distributed denial-of-service (DDoS), SYN flood, and encrypted attacks.

Kaspersky Internet Security для всех устройств

Kaspersky Internet Security для всех устройств

Kaspersky Internet Security для всех устройств — это надежное и удобное решение для защиты вашей жизни в интернете.

  • Оптимальный набор защитных функций
  • Безопасность ваших денег в интернете
  • Защита детей в интернете на любом устройстве
  • Конфиденциальность личности и защита общения
  • Управление защитой всей семьи

* Полный список поддерживаемых платформ см. в Системных требованиях.

Note: Your new license period begins as soon as you complete your purchase. To get maximum value, please do not wait before activating your license.

' data-defaultyear = '' data-defaultpack = '3 устройства' data-promoimage = '@@DetailImage@@' data-discountlabel = '' data-buybuttontext = '' data-purchasetype = 'Purchase' data-showstrikethrough = '' data-currencyinfront= '' data-fortext = 'на' data-showmore='More devices' data-showless='@@showLess@@' data-buybuttonlightbox='Buy Now' data-renewlabel='Автоматическое продление' data-lightboxtitle='Auto-Renewal Service' data-lightboxdesc='Our hassle-free Auto-Renewal Service automatically extends your licence before it&nbsp;expires*. Benefits of&nbsp;automatically renewing your license include:' data-lightboxoption1='<p><b>Savings</b>&nbsp;&mdash; you will automatically receive the latest discounts on&nbsp;renewal of&nbsp;your subscription&nbsp;&mdash; up&nbsp;to&nbsp;25% on&nbsp;RRP</p>' data-lightboxoption2='<p><b>Uninterrupted protection</b>&nbsp;&mdash; Your subscription will automatically renew for continuous protection</p>' data-lightboxoption3='<p><b>Saves you time</b>&nbsp;&mdash; we&nbsp;take care of&nbsp;everything for you and will send you notifications to&nbsp;inform you of&nbsp;your next billing date &amp;&nbsp;confirmation that your license has been renewed</p>' data-lightboxautorenewtext='Automatically Renew My License:' data-lightboxrenewyes='Yes' data-lightboxrenewno='No' data-lightboxsave='@@lightboxSave@@' data-pricealign='@@pricealign@@' data-morepcstext='@@morepcstext@@' data-morepcsautorenewtext='@@popupMoreAutorenewBody@@' data-filteredterms = "" data-filteredpacks = "" data-domain='/' data-delimiter= "" data-currencyorder= "" data-findstorelink='/find_store?icid=ktsmd_retail_link' data-popularpack = '3 устройства' >

Security overview

Security overview Introduction

Evernote users trust us with billions of their notes, projects, and ideas. That trust is based upon us keeping that data both private and secure. The information on this page is intended to provide transparency about how we protect that data. We will continue to expand and update this information as we add new security capabilities and make security improvements to our products.

Security Program

Security is a dedicated team within Evernote. Our security team's charter is protecting the data you store in our service. We drive a security program that includes the following focus areas: product security, infrastructure controls (physical and logical), policies, employee awareness, intrusion detection, and assessment activities.

The security team runs an in-house Incident Response program and provides guidance to Evernote employees on how to report suspicious activity. Our IR team has procedures and tools in place to respond to security issues and continues to evaluate new technologies to improve our ability to detect attacks against our infrastructure, service, and employees.

We periodically assess our infrastructure and applications for vulnerabilities and remediate those that could impact the security of customer data. Our security team continually evaluates new tools to increase the coverage and depth of these assessments.

Network Security

Evernote defines its network boundaries using a combination of load balancers, firewalls, and VPNs. We use these to control which services we expose to the Internet and to segment our production network from the rest of our computing infrastructure. We limit who has access to our production infrastructure based on business need and strongly authenticate that access.

We protect our service against distributed denial of service (DDoS) attacks using an on-demand mitigation service.

Account Security

Evernote never stores your password in plaintext. When we need to securely store your account password to authenticate you, we use PBKDF2 (Password Based Key Derivation Function 2) with a unique salt for each credential. We select the number of hashing iterations in a way that strikes a balance between user experience and password cracking complexity.

While we don’t require you to set a complex password, our password strength meter will encourage you to choose a strong one. We limit failed login attempts on both a per-account and per-IP-address basis to slow down password guessing attacks.

Evernote offers two-step verification (2SV). also known as two-factor authentication, for all accounts. Our two-step verification mechanism is based on a time-based one-time password algorithm (TOTP). All users can generate codes locally using an application on their mobile device while premium and business users can choose to have the codes delivered as a text message.

Email Security

Evernote gives you a way to create notes in your account by sending emails to a unique Evernote email address. To protect you from malicious content, we scan all email we receive using a commercial anti-virus scanning engine.

When you receive an email from Evernote, we want you to be confident that it really came from us. We publish an enforcing DMARC policy to improve your confidence that email you receive from Evernote is legitimate. Every email we send from @evernote.com and @email.evernote.com will be cryptographically signed using DKIM and originate from an IP address we publish in our SPF record.

Product Security

Securing our Internet-facing web service is critically important to protecting your data. Our security team drives an application security program to improve code security hygiene and periodically assess our service for common application security issues including: CSRF, injection attacks (XSS, SQLi), session management, URL redirection, and clickjacking.

Our web service authenticates all third party client applications using OAuth. OAuth provides a seamless way for you to connect a third party application to your account without needing to give the application your login credentials. Once you authenticate to Evernote successfully, we return an authentication token to the client to authenticate your access from that point forward. This eliminates the need for a third party application to ever store your username and password on your device.

Every client application that talks to our service uses a well-defined thrift API for all actions. By brokering all communications through this API, we’re able to establish authorization checks as a foundational construct in the application architecture. There is no direct object access within the service and each client’s authentication token is checked upon each access to the service to ensure the client is authenticated and authorized to access a particular note or notebook. Please see dev.evernote.com for more information.

Customer Segregation

The Evernote service is multi-tenant and does not segment your data from other users’ data. Your data may live on the same servers as another user’s data. We consider your data private and do not permit another user to access it unless you explicitly share it. See the Product Security section for how we enforce our authorization model for access to private and shared content.

Data Destruction

Evernote retains your content unless you take explicit steps to delete notes and/or notebooks. Deactivating a personal account or revoking access to a business account does not automatically remove content.

For personal notes and notebooks, you can remove your content by deleting all the notes in a notebook and then deleting all the notes residing in your trash. Deleting a notebook automatically moves all the notes associated with that notebook to your trash. When a note is deleted, all references and connections to the data in that note are removed from our databases.

Media Disposal and Destruction

We never repurpose storage media for use outside our production environment if it has ever been used to store user data. We have procedures to securely destroy storage media by degaussing and physically smashing prior to disposal. Additional details can be found on our blog .

Customer Account Access

Evernote, like most cloud services, has an administrative tool. This tool allows our customer service and platform administration teams to resolve customer issues. We limit who has access to customer data within this administration tool based on business need and strongly authenticate that access.

We periodically review employee access to customer accounts to identify administrative abuse and minimize the situations where we might need to access account content in the future.

Activity Logging

The Evernote service performs server-side logging of client interactions with our services. This includes web server access logging, as well as activity logging for actions taken through our API. These logs also include successful and unsuccessful login events. Due to the nature of our client / server architecture, we cannot reliably know whether a synced note was viewed. We do not automatically collect activity logs from our software clients. You can view the recent access times and IP addresses for each application connected to your account in the Access History section of your Account Settings.

Transport Encryption

Evernote uses industry standard encryption to protect your data in transit. This is commonly referred to as transport layer security (“TLS”) or secure socket layer (“SSL”) technology. In addition, we support HTTP Strict Transport Security (HSTS) for the Evernote service (www.evernote.com). We support a mix of cipher suites and TLS protocols to provide a balance of strong encryption for browsers and clients that support it and backward compatibility for legacy clients that need it. We plan to continue improving our transport security posture to support our commitment to protecting your data.

We support STARTTLS for both inbound and outbound email. If your mail service provider supports TLS, your email will be encrypted in transit, both to and from the Evernote service.

We operate two data centers in the US and transmit data between them using a dedicated network link that isn’t connected to the Internet. We encrypt all traffic flowing across this link using GCM-AES-128 encryption via the MACsec protocol.

Encrypted Text Within a Note

If you are using an Evernote desktop client, such as Windows Desktop and Evernote for Mac, you can encrypt any text inside a note to add an extra level of protection to private information. Evernote uses AES (Advanced Encryption Standard) with a 128-bit key to encrypt text you select.

When you encrypt text, we prompt you for a passphrase. We take your passphrase along with a unique salt and use PBKDF2 with 50,000 rounds of SHA-256 to derive a 128-bit AES key. We use this key, along with an initialization vector, to encrypt your data in CBC (Cipher Block Chaining) mode.

We never receive a copy of this key or your passphrase and don’t use any escrow mechanism to recover your encrypted data. This means that if you forget your passphrase, we cannot recover your data.

Resiliency / Availability

We operate a fault tolerant system and network architecture to ensure that Evernote is there when you need it, wherever you may be. This includes:

  • Diverse and redundant Internet connections.
  • Redundant network infrastructure including switches, routers, load balancers, and firewalls.
  • Scalable system architecture built using a large number of independently operating shards, each servicing a small slice of our user base.
  • Shards architected as pairs of redundant servers, providing hot standby capabilities should a single server fail.
  • Servers engineered with redundant power, redundant network hardware, and storage deployed in a RAID configuration.

Our colocation vendor provides fault tolerant facility services including: power, HVAC, and fire suppression.

We provide live and historical status updates here: https://twitter.com/evernotestatus and http://status.evernote.com.

We back up all customer content at least once daily and replicate those backups to our backup data center via a private network link. This process ensures that we can recover from a complete site failure in our primary data center. We do not utilize portable or removable media for backups.

Physical Security

When you sync your notes to our servers, they are being stored in a private, locked cage at one of our data centers. These data centers are staffed and monitored 24x7x365. Access to the data center requires at a minimum, two-factors of authentication, but may include biometrics as a third factor.

Each of our data centers has undergone a SOC-1 Type 2 audit, attesting to their ability to physically secure our infrastructure. Only Evernote operations personnel and data center staff have physical access to this infrastructure and our operations team is alerted each time someone accesses our cage, including a video record of the event.

All Evernote data resides inside the United States. Our primary and backup data centers are both located on the west coast in geographically diverse regions.

Privacy and Compliance

Please see our privacy policy for information about our Safe Harbor compliance. We do not publish a Service Organization Control (SOC) report.

Mozilla Security

Mozilla Security listed by product
  • announces all of our releases
  • features security-related articles about Mozilla products.

The latest security updates will be delivered to most users automatically. Users who have turned off automatic updates can use the "Check for Updates. " item on the Help menu. If the menu item is disabled your account does not have sufficient privileges to update Firefox--contact the person who installed Firefox on your machine. Additional help is also available through our Community Support site.

Tips for Secure Browsing
  • Always use the most current version of your browser .
  • Check for the "lock" icon on the status bar that shows that you are on a secured web site. Also check that the URL begins with "https" in the location bar when making transactions online.
  • In the Tools menu of Firefox, Tools > Options. > Privacy, you can clear your information with one click of a button. This is especially useful when using a computer in a public location.
  • Perform transactions (like shopping or submitting personal information) at sites that are well established and that are familiar to you. If you're not familiar with a site, make sure that the site has a privacy policy and information about the site's security measures.
Tips for Using Email Securely
  • Be aware that it is extremely easy for someone to forge an email message to make it appear as if the message has been sent by your bank, a software vendor (e.g. Microsoft), or another entity with whom you do business. If a message requests that you send your password or other private information, or asks that you run or install an attached file, then it is very likely that the message is not legitimate. When in doubt, just mark the message as "junk" and delete it.
  • Be cautious when clicking on links sent to you in email messages. If you do click on such a link, double-check the name of the site as shown in the location bar of the browser, and be especially careful if the site name displayed is an IP address (e.g. "192.168.25.75") instead of a domain name (e.g. "www.example.com"); in the former case it is very likely the site is not legitimate. Don't enter any personal information into forms displayed at such a site, and if you have any concerns whatsoever about your security, just close the browser window.
For Developers: Contacting Mozilla

Report security-related bugs and learn more about how we secure our products:

  • If you believe that you've found a Mozilla-related security vulnerability, please report it by sending email to the address security@mozilla.org. Note that your report may be eligible for a reward; see below.
  • For more information on how to report security vulnerabilities and how the Mozilla community will respond to such reports, see our policy for handling security bugs .
  • We want to make Firefox, Thunderbird, the Mozilla Suite, and other Mozilla products as secure as possible, and want to encourage research, study, timely disclosure, and rapid fixing of any serious security vulnerabilities. We've established a Security Bug Bounty Program to reward people who help us reach that objective.
  • Mozilla-based products include a default list of CA certificates used when connecting to SSL-enabled servers and in other contexts. If you are a CA and would like your CA certificate(s) considered for inclusion in Mozilla, please see the Mozilla CA certificate policy .
  • We encourage you to learn more about our Mozilla security projects and participate in the development of security features and capabilities in our products.

Press Contact: send mail to press at mozilla dot com .

The PGP key for security@mozilla.org below can be used to send encrypted mail or to verify responses received from that address. We changed keys on October 23, 2014. Please see our signed transition statement for confirmation.