Report Code Signing Misuse With Thawte Certificates.
If you have encountered software signed by a Thawte code signing certificate that you believe is being used for malicious or harmful purposes, please report it to Thawte using this form.
Examples Of Misuses Of A Thawte Code Signing Certificate Include But Are Not Limited To:
- The code acts as “spyware”
- The code is included as part of a “phishing” scheme
- Misleading descriptions in the code
- The code is used for “man-in-the-middle” attacks
Thawte code signing certificates are used by software publishers to assure their customers that software they distribute has not been altered or damaged after it is signed. When you accept software signed by a Thawte code signing certificate, you have the assurance that Thawte has authenticated the identity of the publisher of that software. However, Thawte does not perform any review of that software and makes no representations or warranties concerning the quality of that software.
Before Thawte issues a code signing certificate, the software publisher must agree not to distribute malicious or harmful software of any kind. If Thawte confirms that a software publisher is distributing malicious or harmful software, Thawte reserves the right to immediately revoke any code signing or other certificate(s) it may have issued to such publisher.
If you believe that you have been a victim of Malicious Software then please HERE.
Help make the internet safer for everyone.Add to favorites