Assessing Weaknesses in Public Key Infrastructure

cyber

Assessing Weaknesses in Public Key Infrastructure Spreading malware with a legitimate digital certificate is an adversary’s dream come true, with plenty of successful examples tracing back to nation-state attacks such as Stuxnet and Flame, and other misuse that crops up on a regular basis. For a group of University of Maryland researchers, the nagging […]