![]() Once the world learned about the theft, any certificate created from the stolen keys could be revoked and rendered useless. The theft was non-trivial and the stolen keys were only dangerous while the theft remained undiscovered. ![]() We all remember Stuxnet ( read more on that here), but that exploit required the attackers to penetrate and then steal the code signing keys from two trusted software manufacturers. This week’s warning isn’t the usual story of forged certificates or somebody using stolen keys.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |