Case Study Puzzle (Lenovo Superfish)
Across
- 4. Which company was involved in the 2015 Superfish hash collision incident?
- 5. What type of attack (short form) was enabled through the hash collision certificate forgery?
- 7. The Superfish case exposed serious _______ weaknesses.
- 8. What general cyber threat occurred due to weak hash use in Superfish?
- 9. Name the adware that exploited certificate vulnerabilities on Lenovo devices.
Down
- 1. Rogue _______ authorities were created using forged certificates.
- 2. What process was used to create fake certificates that seemed genuine?
- 3. In MITM, the attacker positions in the _______ between sender and receiver.
- 6. Which hash function weakness was exploited in the Superfish attack?
- 9. Which type of security certificate was exploited in this incident?