際際滷shows by User: Blueboxer2014 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: Blueboxer2014 / Mon, 15 Jun 2015 15:35:41 GMT 際際滷Share feed for 際際滷shows by User: Blueboxer2014 Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices /slideshow/decrease-your-circle-of-trust-an-investigation-of-pki-cas-on-mobile-devices/49413027 rsaslideshare-150615153541-lva1-app6891
This year at RSA 2015, Andrew Blaich, lead security analyst at Bluebox, presented the findings of his in-depth investigation into the PKI certificate authorities (CA) that are shipped on mobile devices. The findings proved that users must assume a zero-trust model with their mobile devices to ensure their data is protected from potential risk. Read more about Andrews research here: https://bluebox.com/blog/technical/cnnic-latest-ca-security-compromise-further-questions-the-trustability-of-devices/ https://bluebox.com/blog/technical/questioning-the-chain-of-trust-investigations-into-the-root-certificates-on-mobile-devices/]]>

This year at RSA 2015, Andrew Blaich, lead security analyst at Bluebox, presented the findings of his in-depth investigation into the PKI certificate authorities (CA) that are shipped on mobile devices. The findings proved that users must assume a zero-trust model with their mobile devices to ensure their data is protected from potential risk. Read more about Andrews research here: https://bluebox.com/blog/technical/cnnic-latest-ca-security-compromise-further-questions-the-trustability-of-devices/ https://bluebox.com/blog/technical/questioning-the-chain-of-trust-investigations-into-the-root-certificates-on-mobile-devices/]]>
Mon, 15 Jun 2015 15:35:41 GMT /slideshow/decrease-your-circle-of-trust-an-investigation-of-pki-cas-on-mobile-devices/49413027 Blueboxer2014@slideshare.net(Blueboxer2014) Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices Blueboxer2014 This year at RSA 2015, Andrew Blaich, lead security analyst at Bluebox, presented the findings of his in-depth investigation into the PKI certificate authorities (CA) that are shipped on mobile devices. The findings proved that users must assume a zero-trust model with their mobile devices to ensure their data is protected from potential risk. Read more about Andrews research here: https://bluebox.com/blog/technical/cnnic-latest-ca-security-compromise-further-questions-the-trustability-of-devices/ https://bluebox.com/blog/technical/questioning-the-chain-of-trust-investigations-into-the-root-certificates-on-mobile-devices/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rsaslideshare-150615153541-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This year at RSA 2015, Andrew Blaich, lead security analyst at Bluebox, presented the findings of his in-depth investigation into the PKI certificate authorities (CA) that are shipped on mobile devices. The findings proved that users must assume a zero-trust model with their mobile devices to ensure their data is protected from potential risk. Read more about Andrews research here: https://bluebox.com/blog/technical/cnnic-latest-ca-security-compromise-further-questions-the-trustability-of-devices/ https://bluebox.com/blog/technical/questioning-the-chain-of-trust-investigations-into-the-root-certificates-on-mobile-devices/
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices from Blueboxer2014
]]>
884 1 https://cdn.slidesharecdn.com/ss_thumbnails/rsaslideshare-150615153541-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Transforming any apps into self-defending apps /slideshow/bluebox-transform-any-app-slideshare/47621047 blueboxtransformanyappslideshare-150430133055-conversion-gate02
According to Gartner, 75 percent of mobile applications will fail basic security tests through 2015. The explosive growth of BYOA raises the question of, Are you at risk?" Take a look at our latest webinar with Sean Frazier, senior sales engineer, to learn how to transform any mobile app into a self-defending app to best protect your enterprise from mobile threats. Download the full recording here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html]]>

According to Gartner, 75 percent of mobile applications will fail basic security tests through 2015. The explosive growth of BYOA raises the question of, Are you at risk?" Take a look at our latest webinar with Sean Frazier, senior sales engineer, to learn how to transform any mobile app into a self-defending app to best protect your enterprise from mobile threats. Download the full recording here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html]]>
Thu, 30 Apr 2015 13:30:55 GMT /slideshow/bluebox-transform-any-app-slideshare/47621047 Blueboxer2014@slideshare.net(Blueboxer2014) Transforming any apps into self-defending apps Blueboxer2014 According to Gartner, 75 percent of mobile applications will fail basic security tests through 2015. The explosive growth of BYOA raises the question of, Are you at risk?" Take a look at our latest webinar with Sean Frazier, senior sales engineer, to learn how to transform any mobile app into a self-defending app to best protect your enterprise from mobile threats. Download the full recording here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blueboxtransformanyappslideshare-150430133055-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> According to Gartner, 75 percent of mobile applications will fail basic security tests through 2015. The explosive growth of BYOA raises the question of, Are you at risk?&quot; Take a look at our latest webinar with Sean Frazier, senior sales engineer, to learn how to transform any mobile app into a self-defending app to best protect your enterprise from mobile threats. Download the full recording here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html
Transforming any apps into self-defending apps from Blueboxer2014
]]>
1046 1 https://cdn.slidesharecdn.com/ss_thumbnails/blueboxtransformanyappslideshare-150430133055-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
200:1 - Do You Trust Your Mobile Security Odds? /slideshow/2001-do-you-trust-your-mobile-security-odds/42269088 forristaltrustwebinarnoanimationsslidesharefinal-141202112931-conversion-gate02
On Wednesday, November 12, Bluebox Security hosted a webinar titled, 200:1 Do You Trust Your Mobile Security Odds? Jeff Forristal, CTO of Bluebox, shares real-life iOS and Android case studies revealing the amount of implicit trust, risk and insecurity found in todays mobile devices, and what users can do about it. Watch the recorded webinar in its entirety here: http://offers.bluebox.com/webinar-trust-security-odds.html]]>

On Wednesday, November 12, Bluebox Security hosted a webinar titled, 200:1 Do You Trust Your Mobile Security Odds? Jeff Forristal, CTO of Bluebox, shares real-life iOS and Android case studies revealing the amount of implicit trust, risk and insecurity found in todays mobile devices, and what users can do about it. Watch the recorded webinar in its entirety here: http://offers.bluebox.com/webinar-trust-security-odds.html]]>
Tue, 02 Dec 2014 11:29:31 GMT /slideshow/2001-do-you-trust-your-mobile-security-odds/42269088 Blueboxer2014@slideshare.net(Blueboxer2014) 200:1 - Do You Trust Your Mobile Security Odds? Blueboxer2014 On Wednesday, November 12, Bluebox Security hosted a webinar titled, 200:1 Do You Trust Your Mobile Security Odds? Jeff Forristal, CTO of Bluebox, shares real-life iOS and Android case studies revealing the amount of implicit trust, risk and insecurity found in todays mobile devices, and what users can do about it. Watch the recorded webinar in its entirety here: http://offers.bluebox.com/webinar-trust-security-odds.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forristaltrustwebinarnoanimationsslidesharefinal-141202112931-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> On Wednesday, November 12, Bluebox Security hosted a webinar titled, 200:1 Do You Trust Your Mobile Security Odds? Jeff Forristal, CTO of Bluebox, shares real-life iOS and Android case studies revealing the amount of implicit trust, risk and insecurity found in todays mobile devices, and what users can do about it. Watch the recorded webinar in its entirety here: http://offers.bluebox.com/webinar-trust-security-odds.html
200:1 - Do You Trust Your Mobile Security Odds? from Blueboxer2014
]]>
1066 5 https://cdn.slidesharecdn.com/ss_thumbnails/forristaltrustwebinarnoanimationsslidesharefinal-141202112931-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Transforming Risky Mobile Apps into Self Defending Apps /slideshow/transforming-risky-apps-to-self-defending/39844287 blueboxfortifyinginternalappsslidesharefinal-141003100738-phpapp01
On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises. View and listen to the entire webinar here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html]]>

On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises. View and listen to the entire webinar here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html]]>
Fri, 03 Oct 2014 10:07:38 GMT /slideshow/transforming-risky-apps-to-self-defending/39844287 Blueboxer2014@slideshare.net(Blueboxer2014) Transforming Risky Mobile Apps into Self Defending Apps Blueboxer2014 On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises. View and listen to the entire webinar here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blueboxfortifyinginternalappsslidesharefinal-141003100738-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises. View and listen to the entire webinar here: http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html
Transforming Risky Mobile Apps into Self Defending Apps from Blueboxer2014
]]>
898 1 https://cdn.slidesharecdn.com/ss_thumbnails/blueboxfortifyinginternalappsslidesharefinal-141003100738-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android Vulnerability: Fake ID /slideshow/android-vulnerability-fake-id/38877142 us-14-forristal-androidfakeidfinal-140909102632-phpapp02
Every Android application has its own unique identity, typically inherited from the corporate developers identity. In July 2014, the Bluebox Security research team, Bluebox Labs, released the details of a new vulnerability discovered in Android, which allows these identities to be copied and used for nefarious purposes. Dubbed Fake ID, the vulnerability allows malicious applications to impersonate specially recognized trusted applications without any user notification. This can result in a wide spectrum of consequences. For example, the vulnerability can be used by malware to escape the normal application sandbox and take one or more malicious actions: insert a Trojan horse into an application by impersonating Adobe Systems; gain access to NFC financial and payment data by impersonating Google Wallet; or take full management control of the entire device by impersonating 3LM. This year at Black Hat USA, Jeff Forristal, CTO of Bluebox, presented on Fake ID. His presentation explains the technical details of how the vulnerability works. Watch a demo of the vulnerability here: http://offers.bluebox.com/resource-video-fakeID-recording.html?aliId=903578]]>

Every Android application has its own unique identity, typically inherited from the corporate developers identity. In July 2014, the Bluebox Security research team, Bluebox Labs, released the details of a new vulnerability discovered in Android, which allows these identities to be copied and used for nefarious purposes. Dubbed Fake ID, the vulnerability allows malicious applications to impersonate specially recognized trusted applications without any user notification. This can result in a wide spectrum of consequences. For example, the vulnerability can be used by malware to escape the normal application sandbox and take one or more malicious actions: insert a Trojan horse into an application by impersonating Adobe Systems; gain access to NFC financial and payment data by impersonating Google Wallet; or take full management control of the entire device by impersonating 3LM. This year at Black Hat USA, Jeff Forristal, CTO of Bluebox, presented on Fake ID. His presentation explains the technical details of how the vulnerability works. Watch a demo of the vulnerability here: http://offers.bluebox.com/resource-video-fakeID-recording.html?aliId=903578]]>
Tue, 09 Sep 2014 10:26:32 GMT /slideshow/android-vulnerability-fake-id/38877142 Blueboxer2014@slideshare.net(Blueboxer2014) Android Vulnerability: Fake ID Blueboxer2014 Every Android application has its own unique identity, typically inherited from the corporate developers identity. In July 2014, the Bluebox Security research team, Bluebox Labs, released the details of a new vulnerability discovered in Android, which allows these identities to be copied and used for nefarious purposes. Dubbed Fake ID, the vulnerability allows malicious applications to impersonate specially recognized trusted applications without any user notification. This can result in a wide spectrum of consequences. For example, the vulnerability can be used by malware to escape the normal application sandbox and take one or more malicious actions: insert a Trojan horse into an application by impersonating Adobe Systems; gain access to NFC financial and payment data by impersonating Google Wallet; or take full management control of the entire device by impersonating 3LM. This year at Black Hat USA, Jeff Forristal, CTO of Bluebox, presented on Fake ID. His presentation explains the technical details of how the vulnerability works. Watch a demo of the vulnerability here: http://offers.bluebox.com/resource-video-fakeID-recording.html?aliId=903578 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/us-14-forristal-androidfakeidfinal-140909102632-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Every Android application has its own unique identity, typically inherited from the corporate developers identity. In July 2014, the Bluebox Security research team, Bluebox Labs, released the details of a new vulnerability discovered in Android, which allows these identities to be copied and used for nefarious purposes. Dubbed Fake ID, the vulnerability allows malicious applications to impersonate specially recognized trusted applications without any user notification. This can result in a wide spectrum of consequences. For example, the vulnerability can be used by malware to escape the normal application sandbox and take one or more malicious actions: insert a Trojan horse into an application by impersonating Adobe Systems; gain access to NFC financial and payment data by impersonating Google Wallet; or take full management control of the entire device by impersonating 3LM. This year at Black Hat USA, Jeff Forristal, CTO of Bluebox, presented on Fake ID. His presentation explains the technical details of how the vulnerability works. Watch a demo of the vulnerability here: http://offers.bluebox.com/resource-video-fakeID-recording.html?aliId=903578
Android Vulnerability: Fake ID from Blueboxer2014
]]>
2061 3 https://cdn.slidesharecdn.com/ss_thumbnails/us-14-forristal-androidfakeidfinal-140909102632-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile Security Trends in the Workplace /slideshow/mobile-security-trends-in-the-workplace/38178325 mobilesecurityworkplacetrendsslidesharefinal-140820102548-phpapp01
In February 2014, Bluebox surveyed more than 100 IT professionals and employees to better understand the role BYOD plays within organizations.]]>

In February 2014, Bluebox surveyed more than 100 IT professionals and employees to better understand the role BYOD plays within organizations.]]>
Wed, 20 Aug 2014 10:25:47 GMT /slideshow/mobile-security-trends-in-the-workplace/38178325 Blueboxer2014@slideshare.net(Blueboxer2014) Mobile Security Trends in the Workplace Blueboxer2014 In February 2014, Bluebox surveyed more than 100 IT professionals and employees to better understand the role BYOD plays within organizations. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobilesecurityworkplacetrendsslidesharefinal-140820102548-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In February 2014, Bluebox surveyed more than 100 IT professionals and employees to better understand the role BYOD plays within organizations.
Mobile Security Trends in the Workplace from Blueboxer2014
]]>
701 1 https://cdn.slidesharecdn.com/ss_thumbnails/mobilesecurityworkplacetrendsslidesharefinal-140820102548-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Infographic: Mobile At Work /slideshow/infographic-mobile-at-work/38178246 blueboxmobileatwork-140820102337-phpapp02
90% of employees use their personal smartphones at work, 35% use tablets in the office and 40% use two or more personal devices. Is your data secure? ]]>

90% of employees use their personal smartphones at work, 35% use tablets in the office and 40% use two or more personal devices. Is your data secure? ]]>
Wed, 20 Aug 2014 10:23:37 GMT /slideshow/infographic-mobile-at-work/38178246 Blueboxer2014@slideshare.net(Blueboxer2014) Infographic: Mobile At Work Blueboxer2014 90% of employees use their personal smartphones at work, 35% use tablets in the office and 40% use two or more personal devices. Is your data secure? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blueboxmobileatwork-140820102337-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 90% of employees use their personal smartphones at work, 35% use tablets in the office and 40% use two or more personal devices. Is your data secure?
Infographic: Mobile At Work from Blueboxer2014
]]>
412 2 https://cdn.slidesharecdn.com/ss_thumbnails/blueboxmobileatwork-140820102337-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Blueboxer2014-48x48.jpg?cb=1523568261 https://cdn.slidesharecdn.com/ss_thumbnails/rsaslideshare-150615153541-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/decrease-your-circle-of-trust-an-investigation-of-pki-cas-on-mobile-devices/49413027 Decrease Your Circle o... https://cdn.slidesharecdn.com/ss_thumbnails/blueboxtransformanyappslideshare-150430133055-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bluebox-transform-any-app-slideshare/47621047 Transforming any apps ... https://cdn.slidesharecdn.com/ss_thumbnails/forristaltrustwebinarnoanimationsslidesharefinal-141202112931-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/2001-do-you-trust-your-mobile-security-odds/42269088 200:1 - Do You Trust Y...