News

Code-signed apps are harder to detect by network security appliances, making it easier to sneak malware onto a vulnerable system. The downside? Certificates aren't cheap — and hackers usually are.
A hacker is using fake code-signing certificates impersonating cybersecurity firm Emsisoft to target customers using its security products, hoping to bypass their defenses. Bill Toulas February 15 ...
Whether you create your own code-signing certificate, or use a certificate from a certificate authority, it’s easy to give your Windows binaries the seal of approval.
Opera Software revealed an expired code-signing certificate was stolen and used to sign malware distributed to Windows users of the Opera browser this month.
Yet, despite those problems, it's the most refined version of the company's operating system, regardless of the unsavory ...
In addition, code signing certificates can be sold many times over before their value begins to diminish, making them huge money makers for hackers and dark web merchants.
In fact, the same certificate is used to sign the official Ivacy VPN installer linked to from the VPN provider's website. The code-signing certificate in question (@malwrhunterteam) ...
The Certificate Authority Security Council has released new Minimum Requirements for Code Signing for use by all CAs (Certificate Authorities).
Opera Software said Wednesday hackers pilfered from its internal systems at least one code-signing certificate that was used to sign malicious software.
GitHub says hackers cloned code-signing certificates in breached repository It remains unclear how the threat actor compromised access token used in the breach.
Researchers have discovered that digital code signing certificates are being sold for more than is required to buy a gun in the web's underground markets. On Tuesday, security researchers from ...