DerbyCon A sprinkle of code and an understanding of the Windows digital certificate process is all that’s needed for a miscreant to sneak malware past Microsoft’s application whitelist within a corporate environment. In a keynote address at the DerbyCon hacking conference in Kentucky, USA, on Friday, Matt Graeber, a security researcher with SceterOps, detailed how he managed to disguise and run a banned software nasty as a legit whitelisted app, and thus bypass Redmond’s security mechanisms.
Read full news article on The Register