Latest in D-link

Image credit:

Leaked D-Link code-signing key could make malware look legit

15 Shares
Share
Tweet
Share

Sponsored Links

When your company is known for making wireless routers, network switches and home security cameras, leaking your code-signing private keys yourself is the last thing you want to do. Back in February, that's exactly what D-Link did, accidentally leaving a valid key visible in its open-source firmware. If found by an attacker, the key could have been used to make malware that can pass as official software from D-Link -- malware that wouldn't trigger security warnings when installed to Windows or OS X machines.

That's bad, but luckily would-be attackers would have had to stumble across the key weeks ago -- the leaked certificate expired earlier this month. Still, that means software created using the key between February and September is still valid. D-Link says it's issuing more firmware updates in the near future to address the issue

Source: Tweakers
In this article: d-link, dlink, key, leak, router, security, verify
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
Comment
Comments
Share
15 Shares
Share
Tweet
Share

Popular on Engadget

Lilium proves its electric air taxi can fly

Lilium proves its electric air taxi can fly

View
'Pokémon Go' will introduce online battles in early 2020

'Pokémon Go' will introduce online battles in early 2020

View
Google's new emulator makes Android Automotive development easier

Google's new emulator makes Android Automotive development easier

View
Watch the final 'Star Wars: The Rise of Skywalker' trailer

Watch the final 'Star Wars: The Rise of Skywalker' trailer

View
What's on TV this week: 'The Outer Worlds'

What's on TV this week: 'The Outer Worlds'

View

From around the web

Page 1Page 1ear iconeye iconFill 23text filevr