Case Study Puzzle (Lenovo Superfish)

123456789
Across
  1. 4. Which company was involved in the 2015 Superfish hash collision incident?
  2. 5. What type of attack (short form) was enabled through the hash collision certificate forgery?
  3. 7. The Superfish case exposed serious _______ weaknesses.
  4. 8. What general cyber threat occurred due to weak hash use in Superfish?
  5. 9. Name the adware that exploited certificate vulnerabilities on Lenovo devices.
Down
  1. 1. Rogue _______ authorities were created using forged certificates.
  2. 2. What process was used to create fake certificates that seemed genuine?
  3. 3. In MITM, the attacker positions in the _______ between sender and receiver.
  4. 6. Which hash function weakness was exploited in the Superfish attack?
  5. 9. Which type of security certificate was exploited in this incident?