Software vulnerabilities, security threats and mitigation strategies
Attack on SSL by hacking the CA and creating rouge certificates.