This years BlackHat security conference revealed some serious security loophole in way SSL certificates can be made to spoof domain identity, the trick allows phishers to spoof and display certificate of their choice on user browsers, this means that the attacker could make you land onto a phishing domain (say www.paypal.com.hisfakesite.com) and your browser will validate the SSL certificate for genuine domain (say www.paypal.com), the spoof works like this - the attacker applies for a SSL certificate with a null-character in the sub-domain for example : www.paypal.com[null character here].hisfakesite.com, the certificate authority ignores the sub-domain and contacts the domain owner to verify its legitimacy and issue the certificate, the problem arrives when clients like Firefox stop at the null character and wrongly displays the certificate valid for www.paypal.com on the phishing domain in this case.