Image source: Article |
Although only two files were signed, the hack effectively gave the attackers the ability to create malware masquerading as legitimate Adobe software and signals a raising of the stakes in the world of Advanced Persistent Threats (APTs). Guardtime keyless signatures were not in use, thereby allowing the tampering to go undetected.
Are your adobe products at risk? Read the article to learn more.
No comments:
Post a Comment