Assigned Zemana secret settings?

This thread is being handled by a member of the staff.
Status
Not open for further replies.

Aktiffiso

Level 9
Thread author
Verified
Aug 24, 2013
411
Do you check semana secreet seetings? in advanced options where say stay away? What mean Detect suspicious certificates Root CA?
 

Parsh

Level 25
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Dec 27, 2016
1,480
I'll simply explain what are these certificates and you'll get the point.

Suppose that you you visit your bank site, then your browser relies on digital certificates to ensure you are connected to the intended Web site only(for identity and security).
Who provides them? There are trusted 'Certification Authority' or CA from whom your banking site purchases their certificate to prove their authenticity and trustworthiness.
Now, that CA shouldn't issue the same certificate to any other party. If that happens, that party can pose as your bank and turn a fraudster!
Alternatively, the CA himself can be hacked and the certificate (intended for your bank) may become a property of the hacker also. It's misused then. That's one of the scenarios.
Root certificate is secondary here - When a device tries to validate a certificate, if it's not provided by any known trusted CA, the device client goes up the CA hierarchy (hierarchy of CAs on the internet) till the top (the Root Certificate) to validate.

So now you have the idea that if a ROOT Certificate (one thought to be the root, by your device) is a compromised one or fake one, it's a big inherent trouble!

(and that's what Zemana and others strive to inspect)
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top