LibreOffice and OpenOffice released security updates to address a vulnerability that can be exploited by an attacker to spoof signed…
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature.…
Boffins from the Ruhr University Bochum (Germany) have disclosed a series of new attack methods, dubbed Shadow attacks, against signed…
Experts found several flaws in popular PDF viewers and online validation services that allow to deceive the digital signature validation…
Google fixed a bug dubbed Janus that could be exploited by attackers to inject malicious code into Android apps without affecting an…
Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm.…
The Taiwanese networking equipment manufacturer D-Link has accidentally published its private code signing keys in the source of one of…
Security researcher Billy Rios has created WhiteScope, a database containing hundreds of thousands of "known-good" files of SCADA and ICS…
Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a…
The China-based group Android Security Squad revealed a new Android Master Key attack that exploits the vulnerability in the way the…
This website uses cookies.