There are 2 concepts to "secured" sites: "Encryption" and "Authentication";
and they are distinctly different aspects.
"Encryption" is a method of private communication: nothing else.
When "https" ('s' indicating 'secure') is available for a site, it indicates that traffic goes to & from whom is indicated in the address bar & encrypted (so no one else can 'read' or intercept it).
It is NOT an indication of reliability, trustworthiness, internal security, or anything else about a any particular entity; the content of the website; or the presence of malware.
That you must do on your own.
The "Authentication" aspect is from whom the "Root Certificate" was issued for a sites certificate.
This is the "recognized" organization (by REPUTATION ONLY), that has done the background check on the receiving website owners: verifying a few BASIC checks. In effect saying "They are who they say they are."
Note however that there is NO REGULATING AUTHORITY FOR THIS 'AUTHENTICATION'; nor for how 'deep' the investigation goes, and can be easily fooled by anyone seeking a certificate.
(See "Security Now" #245; http://www.grc.com/sn/sn-245.htm
(Verisign does however offer "Extended Validation" which uses more robust inspections).
Your browser will tell you if you are over 'secure' servers (the 'encryption' aspect) by way of "https" in the URL prefix.
You however, must verify who exactly has issued any "Certificate" for that site (the padlock aspect).
Always right click the browsers "lock", then examine the certificate's pedigree before commencing any data exchanges.
[Firefox users can use "Certificate Patrol" to help monitor CA's: http://patrol.psyced.org/ ]
To verify this 'Root Certificate' is legit;
Firefox= browser tools> Options> Advanced> Encryption tab> View certificates> Authorities tab.
IE= Tools> Options> Content> Certificates> Trusted Root....tab.
-Compare their issuing Certificate Authority to these in your browser's official list. Any strange authority could mean some monkey business going on.
This setting helps deter SSL spoofing:
Browser> Tools > Options> > Advanced> Security heading> check "Warn about certificate address mismatch"> OK out.
Some sites 'sign' there own certificate & use a commonly available encryption method. Although the traffic is encrypted, and the site may in fact be "on the level", this type of certificate can be questionable at the very least.
SSL (now TLS) is not an absolute state of affairs over the Internet.
(For further discussion: Security Now! with Steve Gibson, Episode 223 for The Trouble with SSL: http://www.grc.com/sn/sn-223.htm
Use multiple resources to obtain feedback on a sites 'trustworthiness'.
"Web of Trust" add-on is one decent source.
Google can give search results on a businesses trust & satisfaction, and customer comments.