Microsoft rejecting emails as spam

Microsoft blocks emails from legitimate sources

Once again in the war on spam, there are friendly casualties. Many users are reporting that their emails are not getting through to Hotmail and users. Some of our clients are reporting that they are not receiving emails to their Microsoft email addresses from us. This of course risks users not receiving important emails about their domains and services. Read More

3 million Let’s Encrypt certificates to be cancelled

Let's Encrypt CAA flaw

Let’s Encrypt revoked certificates

Let’s Encrypt has announced that it is to revoke aroound 3 million TLS/SSL certificates because of a serious flaw found in the CAA (Certificate Authority Authorization). The certificates will be revokend on the 4th March 2020 from 00:00 UTC. Read More

Apple reduces SSL/TLS certificates accepted lifespan to 1 year

Apple will not trust SSL of more than 1 year

What has Apple done

Apple has decided that they will no longer support TLS/SSL certificates that have a valid period of more than 1 year (398 days to be exact) as of 1st September 2020. This means that if, after that date, you order a certificate for your website that has a longer valid period then it will not be trusted on any Apple system, including iPhones, iPads, Apple computers, Safari, etc.
The policy that was unveiled at a Certificate Authority Browser Forum (CA/Browser) meeting on Wednesday (19/02/2020). Accordingly certificates issued after 1st September 2020 will not be trusted if they are longer than 1 year (398 days) but those that were issued before that date will still be honoured. Read More

The Death of EV SSL Certificates

It was reported some months ago that Google Chrome among other browsers were looking in to the fact that Extended Validation SSL certificates were not really worth the money or effort nor working as intended for use.

The Identified Issue

The Chrome developers at Google questioned the validity of E.V. certificates some months ago after carry out research with users. They discovered that it made absolutely no difference to users behavior when entering credit card or username and password information on websites. In fact most users do not even know the difference between a bottom of the range ACME (Automated Certificate Management Environment) certificate provided by the likes of Let’s Encrypt and the top of thee range, most expensive E.V certs. They called for action to be taken in this but no solution has been found to correct this.

The Result

The results of this research, combined with the fact that the E.V. certificates take up much needed space on the address bar, and it has been dropped on most mobile platforms already is that it will now be removed from Chrome. Mozilla has said it will also be removing it from Firefox in the very near future as well. Going forward all browsers will move the E.V information to the Certificate information section which needs to be clicked to be seen. This move basically renders the E.V certificate dead. They cost substantially more than any other type of certificate and are much harder to obtain due to the level of scrutiny required to obtain one.

What Are The Differences Between SSL Certificates

The different types of certificate available to websites were meant to be a representative of how secure or how much trust you could give to the website. a basic ACME type of certificate provided by the likes of Let’s Encrypt is the bottom of the range. There is absolutely no trust in the company or entity that owns the domain or website. There is  no checks made on them. So if they put up a website that looks like you local bank, it matter not to the certificate supplier as they are not looking at it. The ACME certificates are automatically installed and renewed as long as the basics can be verified. That being that the DNS records can have one added to it and it is hosted on that server. This is the cheapest type as they are usually free and only come in the basic encryption level.

The cheapest paid for certificates are much the same but there is a check on the domain made that means that an actual person has to verify they own the domain name by way of an email sent to an email address on the domain, such as admin, administrator or webmaster. This only proves that the person asking for the certificate is an actual person who has access to the domain and email account. These are also know as D.V. (Domain Vetted) certificates.

The next level up is O.V. (Organisation Vetted) certificates. These are a bit more expensive but give the user some information about the organisation behind the certificate so that they can be more sure of who they are dealing with. These require the issuing authority to check the person/company actually exists before issuing a certificate. They therefor take longer to issue than the ACME which are instant and the DV certificates which are usually within an hour.

The next Level is the E.V. (Extended Validation) certificates. These are much harder to get as there is a lot more checks carried out by a human being in the issuing authority and so the cost is much higher for them. They use to give you a green bar at the top and a green padlock on other browsers. The should have allowed visitors to know that you have been fully vetted and can be trusted to take credit card details. They were akin to the old fashioned banks. In the Old Wild West, there was a big problem with banks opening up, taking in customer deposits and then disappearing by morning, in some cases a while later, but you get the idea. They would open up, take money in and then as quick as they arrived they were gone, with all the money. That is why banks have big buildings that cost lots of money, to show that they were there fro the long haul and were trust worth. The average conman did not want to spend any money on something he was going to throw away. EV certificates were the same for the internet. Deliberately expensive and hard to get so that the holder of one could show they were trustworthy and not a conman.

Sadly, people have not recognised this and as there has been no way proposed to correct this, the browsers who are responsible for showing you the difference are moving the only identifiers to a location very few people ever look.

Having the display of the extra security that the EV certificates provide is not in line with Chromes goal of security by default and then showing those who are not secure in a bad light, rather than promoting those who make things extra secure. There is still a case use for the OV and DV certificates but the EV certificates will probably be phased out as there is little benefit to them above an OV certificate.

Only time will tell, for the moment though you can get any of these certificates in our store and the ACME certificates are available on all new hosting accounts as well.

Stay Safe.


CritchCorp Computers Support


photo credit: Link to SSL via photopin (license)

Microsoft admits hacked

Micrsoft hacked


Microsoft has admitted that its platform was hacked. Users of its email system are affected. That includes, MSN and Hotmail email accounts.

A support agent had their credentials compromised by hackers. The hackers had full access to which also hosts the msn and Hotmail email accounts. Microsoft will not admit to how many users are affected but say that they have contacted affected users and also as a precaution made them all change their passwords although they say that there are no user credentials that have been compromised.


Secure, easy to use email at a low cost

Get your SecuredMail.App email account and keep your email and attachments private. Your mail is always your mail, and only £2.00 inc VAT/month for 2 email accounts.

Get yours now; get away from those free email accounts and take back control of your data.

Includes - spam and virus filtering, 5GB account, POP/IMAP access, webmail, calendar, auto-responders, import email from your old free account, Address book and much, much more, click below for more details.


Claims that it has been going on for longer

Microsoft dismissed claims that the breach had been going on for around 6 months and stated that it had only been between January 1st and March 28th 2019.They also claim that only around 6% of the total affected users had been fully breached. Certainly the hackers had full access to email and attachments of those affected.

The Managing Director and a Security Expert at CritchCorp Computers Ltd stated:

It seems unlikely that they had different levels of access to users email accounts and more likely that they had full access to all the accounts. However as Microsoft will not elaborate on breach it is difficult to say.

Screen shots of the breach have been provided to Microsoft, which prompted them to admit that the hack had happened and further screen shots to admit to the extent of the hack.

What they may have done

You may well have noticed more phishing emails during this time and indeed in the future. These emails may come from someone you know and use your name in them. They may well urge you to click a link which will inevitably ask you for money in some way, or infect you with a virus that will steal credentials to banking sites or other high value websites.

You should always be vigilant when receiving email and even more so when it comes from a free email account such as Hotmail or but now you will need to extra vigilant.

There is also a suggestion that they may have used the breach to reset stolen iPhones. Apple has started to tie iPhones to the email address. Therefore only the email address holder can reset the phone to factory default.

What to do if you use

If you know of any users then you should urge them to immediately check their email for a message from Microsoft. In any case perhaps change their password and/or email service provider. We recommend SecuredMail.App, BasicMail or our Cloud Mail accounts as an alternative to any free or paid for email service. All are available from our store and can replace, Gmail, yahoo mail and iCloud mail.

Keep Safe

CritchCorp Computers Ltd


How to find out if your website contains malware

How to find out your website is infected


Does Your Website Contain Malware? How can you find out?

When was the last time you checked your website for malware? Maybe, you have a valid reason (business is booming or website is undergoing changes) for not doing so. But this could prove extremely dangerous. Therefore it’s extremely important to check your website for malware from time to time. In this blog, we list some guidelines about how to check for website malware infections and how to protect your websites.

Reactive Ways of Discovering your Website was Hacked

  • Your Website Visitors Are Being Warned By Google Chrome:

    Your users will eventually start complaining about not being able to reach your website and that Google Chrome is blocking it using a message which reads ‘Phishing attack ahead’. If this is the case, it’s a clear sign that your website has been hacked. It’s time you did something about it.


  • Your Hosting Provider Takes Your Site Offline:

    This happens when visitors approach your website hosting provider and lodge complaints with them instead of choosing to approach you. When this happens, your website hosting provider has little choice but to remove your infected-website before the infection spreads to the visitors.


Proactive Ways of Protecting Against Hackers

  • Using Website Malware Scanner:

If you’re someone who thinks along the lines ‘let me find out whether my website is vulnerable or not and then safeguard it’ (which is very wrong thinking, by the way) then there are plenty of free online website malware scanners(like our very own Web Inspector) which can prove useful to you. All you have to do is give your website’s URL and you’ll know whether your website is vulnerable or not within minutes.

  • Using Website Security Application:

This is probably the best way of offering 24/7 protection to your website. As the name suggests, website security applications are website protection tools which protect your websites from various security attacks like DDoS, Brute-Force, SQL Injection etc., through constant monitoring and by employing various website malware detection and prevention techniques.


Speaking in non-technical terms, malware typically hides within the website’s code, which website malware scanners find or detect. Whereas a website security application does not stop at just identification or detection. It gets to the root of the issue and removes the malware from the website. That’s the big difference between these website security or protection tools.

Now, proactive monitoring is important when it comes to website protection. Because, well, prevention is always better than cure. Therefore subscribe to the services of a website security application like Comodo cWatch and make sure your website stays safe against various security threats.

Comodo cWatch is available from CritchCorp Computers Ltd with all our hosting plans and you can get even more protection by upgrading to include the CDN and WAF. See the different options on the cWatch Page.

Check Your Website Security Before It’s Too Late!

Check your website Security before it's too late

You’ve probably tried to visit a website before, only to find that your browser has blocked the site because one or more of its webpages contains malware. But how about the website owners? Do they realize that their site is infected? Shouldn’t they have noticed before your browser did? The answer is “yes.” Follow these steps to make sure your site is secured:

Check Out Google

There’s a way to confirm your suspicion if your website does have malware or other issues. Google has a website for diagnosing unsecured websites. Please use[SITE NAME]. Remember to change the [SITE NAME] into your site address. You’ll see a quick report on your website’s condition there. Though, Google won’t show you what kind of malware attacked you.

Stronger Password Combinations

When Google gives you a report and it has malware on it, you need to change all of your passwords. Use a stronger password combination this time. Avoid reusing passwords for different accounts.

The Hidden Danger

Even new hackers will use a certain attribute to display malicious links. The display=none attribute will prevent visitors and site owners from finding the intruder links. Nobody searches for how to eradicate malware until they have undeniable evidence. The average person might not notice malicious links right away, but search engine bots can. You can be deranked from search engines like Google if such links are found. It is easy to find the unwanted links, but you need to look very carefully for them. Here is what you should do:

  • Open your source code on a web browser. (Most browsers let you go to the Page Source under the View menu.)
  • Check for the and tags for strange links.
  • Look for links next to the “display=none” attribute.


If you know your code, then you will quickly identify the links that should not be there. If this is the first time you are looking at it, the malicious code will usually lead to porn or gambling websites. You can check the links you found or if they are obvious, just block them.

These steps will lessen or protect you from new attacks. Yet there might be security holes left on your website. Check if you have the most recent updates and look in a couple of days if your code is free of unwanted links. Allot another week for check ups again before you can finally say it’s a closed case.

Further Measures to Take

Having another software to protect your website can give you immense benefits. Not only can it avoid damages, it also lessens the stress of a website security. To secure all of your digital assets, you can use Comodo cWatch.

Comodo cWatch a Managed Security Service for websites and applications that combines a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). It is a fully managed solution from a 24/7 staffed Cyber Security Operation Center (CSOC) of certified security analysts and is powered by a Security Information and Event Management (SIEM) center that leverages data from over 85 million endpoints to detect and mitigate threats before they occur. Its other features are Security Monitoring, Web Application Firewall, Malware Removal, and PCI Scanning.