Ars Technica reports on a vulnerability where unencrypted Network Time Protocol (NTP) traffic can be exploited by man-in-the-middle attacks to arbitrarily set the times of computers to cause general chaos and/or carry out other attacks, such as exploiting expired HTTPS certificates.
While NTP clients have features to prevent drastic time changes, such as setting the date to ten years in the past, the paper on the attacks presents various methods for bypassing these protections.
There is a pdf of the report available.
(Score: 0) by Anonymous Coward on Friday October 23 2015, @09:13AM
Why use your own atomic clock, if the time of the official one is broadcasted anyway? [wikipedia.org]
Sure, in principle someone could interfere with that signal, but to do that, he would have to send with such a strong sender that he would be found in no time. Especially given that senders in that frequency range are not exactly known for their smallness.