Researchers have discovered malware circulating in the wild that uses a private signing certificate belonging to the Malaysian government to bypass warnings many operating systems and security software display when end users attempt to run untrusted applications. The stolen certificate belongs to the Malaysian Agricultural …
"quite some time ago."
So these Malaysian authorities *knew this* yet kept mum and didn't revoke the thing?
Well, let's see how quickly mozilla, google, and micros~1 summarily drop them from their CA collections.
Yup, this is most hilarious statement I read in press today.
The sad part is that we have no choice but *still* keep using PKI.
the internet was nice while it lasted
All the king's horses and all the king's men could certify anything ever again
So what cert is that?
If I dump it, will it be back on the next update??
Will this go on forever???
- Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
- FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
- Did a date calculation bug just cost hard-up Co-op Bank £110m?
- Feast your PUNY eyes on highest resolution phone display EVER
- Wall St's DROOLING as Twitter GULPS DOWN analytics firm Gnip