LibreOffice and OpenOffice released security updates to address a vulnerability that can be exploited by an attacker to spoof signed documents. LibreOffice and OpenOffice released security updates to address a moderate-severity flaw that can allow attackers to manipulate documents to appear as signed by a trusted source. “It is possible for an attacker to manipulate documents […]
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature. Researchers from Ruhr-University Bochum have disclosed two new attack techniques, dubbed Evil Annotation and Sneaky Signature attacks, on certified PDF documents that could potentially allow attackers to modify visible content without invalidating their digital signature. The […]
Boffins from the Ruhr University Bochum (Germany) have disclosed a series of new attack methods, dubbed Shadow attacks, against signed PDF files. Security researchers from the Ruhr University Bochum (Germany) have devised a series of new attack techniques, dubbed Shadow attacks, against signed PDF files. In February 2019, the same team of experts found several […]
Experts found several flaws in popular PDF viewers and online validation services that allow to deceive the digital signature validation process. Several PDF viewers and online validation services contain vulnerabilities that can be exploited to make unauthorized changes to signed PDF documents without invalidating their digital signature. A group of academics from the German Ruhr-University […]
Google fixed a bug dubbed Janus that could be exploited by attackers to inject malicious code into Android apps without affecting an appâs signature. Google fixed four dozen vulnerabilities this week, including a bug dubbed Janus that could be exploited by attackers to inject malicious code into Android apps without affecting an appâs signature verification certificates. Millions of Android […]
Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm. Businesses Using Millions of Flawed Certificates, the news is shocking and refers the adoption of SHA-1 certificates, despite the algorithm is considered no more secure. Many big businesses, including firms like Deloitte, are still using SHA-1 certificates, […]
The Taiwanese networking equipment manufacturer D-Link has accidentally published its private code signing keys in the source of one of its firmware update. According to the Dutch news site Tweakers, the Taiwan-based networking equipment manufacturer D-Link accidently published its private code signing keys inside its open source firmware packages. One of the readers of the Dutch news […]
Security researcher Billy Rios has created WhiteScope, a database containing hundreds of thousands of “known-good” files of SCADA and ICS software. The cyber security expert Billy Rios has created WhiteScope, a database containing hundreds of thousands of “known-good” files from makers of SCADA and ICS software with the intent to support users to identify legitimate ICS/SCADA files. “WhiteScope has over […]
Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a  website they control. A significant new security vulnerability has been found in the DNS protocol by a group of Israeli students from the Technionâs Department of Computer Sciences. After the Heartbleed case and the assumptions […]
The China-based group Android Security Squad revealed a new Android Master Key attack that exploits the vulnerability in the way the OS reads APK files allowing modification of signed legitimate apps. The China-based group Android Security Squad found for the second time a serious vulnerability in Android master key management. In the last days it was […]