In a year of unbridled strangeness, these are the strangest cybersecurity events that made us collectively say: “Wait… seriously?”
A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn’t trust these trusted sources.
Vonteera crossed a line when it decided to actively disable anti-malware and anti-virus software. They used certificates to pull that off.