{"id":3391,"date":"2017-03-28T14:55:09","date_gmt":"2017-03-28T18:55:09","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3391"},"modified":"2017-03-28T14:55:09","modified_gmt":"2017-03-28T18:55:09","slug":"symantec-api-flaws-reportedly-let-attackers-steal-private-ssl-keys-and-certs","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/03\/28\/symantec-api-flaws-reportedly-let-attackers-steal-private-ssl-keys-and-certs\/","title":{"rendered":"Symantec API Flaws reportedly let attackers steal Private SSL keys and Certs"},"content":{"rendered":"<p><a href=\"http:\/\/thehackernews.com\/2017\/03\/symantec-ssl-certificates.html\">Article Link<\/a><\/p>\n<p>This is an interesting article. \u00a0Many users install software like Symantec to help keep them safe, and here, there was a flaw that would allow an unauthenticated attacker to retrieve SSL Certificates, but not only that, reissue or revoke those certificates.<\/p>\n<p>The flaw was discovered by an IT consultant from Cloud Harmonics, and Symantec asked the consultant not to disclose the flaw as it would take Symantec almost two years to fix the issue.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Link This is an interesting article. \u00a0Many users install software like Symantec to help keep them safe, and here, there was a flaw that would allow an unauthenticated attacker to retrieve SSL Certificates, but not only that, reissue or revoke those certificates. The flaw was discovered by an IT consultant from Cloud Harmonics, and [&hellip;]<\/p>\n","protected":false},"author":12789,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[716794],"tags":[],"class_list":{"0":"post-3391","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-10-monitoring-evaluating-it","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-SH","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/12789"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3391"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3391\/revisions"}],"predecessor-version":[{"id":3392,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3391\/revisions\/3392"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}