Skip to main content

When you shouldn’t trust a trusted root certificate

  • November 16, 2017
  • 1 reply
  • 8 views

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54


 
16th November, 2017  By Pieter Arntz
 
Root certificates are the cornerstone of authentication and security in software and on the Internet. They’re issued by a certified authority (CA) and, essentially, verify that the software/website owner is who they say they are. We have talked about certificates in general before, but a recent event triggered our desire for further explanation about the ties between malware and certificates.
 
In a recent article by RSA FirstWatch, we learned that a popular USB audio driver had silently installed a root certificate. This self-signed root certificate was installed in the Trusted Root Certification Authorities store. Under normal circumstances, you would have to agree to “Always trust software from {this publisher}” before a certificate would be installed there.
 
Full Article.

1 reply

  • Community Guide
  • November 17, 2017
Nothing is full proof always be on the alert and cautious