Article 3MJ8 Security software found using Superfish-style code, as attacks get simpler

Security software found using Superfish-style code, as attacks get simpler

by
Dan Goodin
from Ars Technica - All content on (#3MJ8)

Two more software makers have been caught adding dangerous, Superfish-style man-in-the-middle code to the applications they publish. The development is significant because it involves AV company Lavasoft and Comodo, a company that issues roughly one-third of the Internet's Transport Layer Security certificates, making it the world's biggest certificate authority.

Lavasoft and Comodo were added just as researchers were discovering simpler, more potent ways to exploit the vulnerabilities.

Late last week came word that self-signed Secure Sockets Layer certificates installed by a company called Komodia caused most browsers to trust any self-signed certificate that used the same easily extracted private key. That was bad, but now, researchers have discovered vulnerabilities in the closely related proxy software of interception applications from Komodia and Comodo. The new insight makes it even easier for attackers to forge trusted credentials that impersonate Bank of America, Google, or any other HTTPS-protected destination on the Internet.

Read 6 remaining paragraphs | Comments

index?i=2OijRuKzOeA:3OT4yH8wp6I:V_sGLiPB index?i=2OijRuKzOeA:3OT4yH8wp6I:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA2OijRuKzOeA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments