Secure connection
Sites where visitors enter personal data use a secure connection. Browsers check the connection and warn you if it's not secure. For example, if a site has certificate problems or unsafe content, you'll see an appropriate icon in the browser's address bar.
Security icons
Security icons are displayed in the address bar. To view connection status, click the icon.
Icon examples | Description |
---|---|
— Yandex Browser — Opera | The connection is secure. The HTTPS protocol is used. |
— Yandex Browser — Mozilla Firefox | We can't guarantee that data is transferred securely. For example, the HTTPS protocol is used, but images are loaded over an insecure protocol. |
— Yandex Browser — Google Chrome | The insecure HTTP protocol is used. We don't recommended entering personal data, especially payment details, on such sites. The information can be stolen by hackers. |
— Yandex Browser — Mozilla Firefox | The page may pose a threat to your data. For example, the site may be a phishing one, it may have dangerous content or use an untrusted certificate. |
Icon examples | Description |
---|---|
— Yandex Browser — Opera | The connection is secure. The HTTPS protocol is used. |
— Yandex Browser — Mozilla Firefox | We can't guarantee that data is transferred securely. For example, the HTTPS protocol is used, but images are loaded over an insecure protocol. |
— Yandex Browser — Google Chrome | The insecure HTTP protocol is used. We don't recommended entering personal data, especially payment details, on such sites. The information can be stolen by hackers. |
— Yandex Browser — Mozilla Firefox | The page may pose a threat to your data. For example, the site may be a phishing one, it may have dangerous content or use an untrusted certificate. |
Learn more about security icons:
Protection against unsafe content on HTTPS pages
The HTTPS protocol supports encryption and is considered secure for the transfer of personal data. But an HTTPS connection is secure only if encryption applies to all page elements. Sometimes, a site page loads over HTTPS but has unencrypted plugins or JavaScript or CSS elements. Attackers can intercept and use them to hack the site. That is why browsers warn you about unsafe content and block it.
You can open unsafe content, but we don't recommend doing so.
Learn more about protection against unsafe content:
Protection against untrusted certificates
If you visit a phishing site, hackers get all data (such as passwords and bank card numbers) that you enter. To prevent this from happening, secure sites use digital certificates that are issued by certification centers. The certificate provides secure data encryption and ensures that the site isn't a phishing one.
If the site has certificate issues, browsers consider it untrusted and block it.
Why untrusted certificates are dangerous
On a website that doesn't have a trusted certificate, attackers can:
- Intercept or substitute your personal data and read your correspondence.
- Get your payment details (card number, owner's name, expiration date, and CVV2) and use them to steal money from your account.
What to do if the site has an untrusted certificate
If you need to open a site with an untrusted certificate
- Check and correct the date and time on your computer. If the time is set incorrectly on the computer, the browser may consider the certificate expired and block the site.
- Clear the cache: the certificate problem may have been fixed in the new page version.
- Disable browser extensions: they may change the site content.
- Disable the antivirus because it can replace the certificate. Please note that after you visit the site, the computer may be infected. Disable the antivirus only as a last resort.
- Turn off JavaScript support.
- Disable the antivirus.
- After visiting the site, turn on the antivirus and run a full scan of your computer for viruses.
- Use the links to download the certificates to your computer:
- Certum CA and Certum Trusted Network CA certificates are downloaded in TXT format. Delete the .txt extension:
- Open the Control panel in Windows.
- Click Folder Options (in Windows 10, click File Explorer Options).
- On the View tab, disable the Hide extensions for known file types option.
- Click Apply.
- Open the Certum CA certificate in Notepad and save it, deleting the .txt extension. You should get the CA.pem file as a result.
- Open the Certum Trusted Network CA certificate in Notepad and save it, deleting the .txt extension. You should get the CTNCA.pem file as a result.
- To import certificates, repeat the following steps for each of them:
- Use the keyboard shortcut Windows + R or go to the Start menu search bar and type “Run”. In the dialog window that opens, enter the
certmgr.msc
command. - Open the Trusted Root Certification Authorities folder and then the Certificates folder.
- Select. This will launch the Certificate Import Wizard.
- Click Next.
- Select the certificate (the downloaded file) and click Next.
- Make sure that the Trusted Root Certification Authorities option is selected in the Certificate Store box. Click Next.
- Click Finish.
- In the dialog window that opens, click I agree.
- Restart the browser.
If nothing helps, try reinstalling the root certificates (for Windows):Update Windows (). If that doesn't help, try downloading and importing certificates manually: