Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN FRANCISCO, CA -- (Marketwired) -- 07/29/13 -- Bluebox Security, a stealth startup tackling enterprise mobile security, today announced that Bluebox chief technology officer, Jeff Forristal, will present on July 31 at Black Hat USA in Las Vegas, Nevada. The presentation, "Android: One Root To Own Them All," will discuss a widely reported vulnerability discovered by Forristal in Android's security model that allows a hacker to modify APK code without breaking an application's cryptographic signature, to turn any legitimate application into a malicious Trojan, completely unnoticed by the app store, the phone, or the end user. The vulnerability was announced by Bluebox on July 3.
WHAT: "Android: One Root To Own Them All"
WHEN: August 1, 11:45am
WHERE: Black Hat 2013, Las Vegas, Nevada
WHO: Jeff Forristal, chief technology officer, Bluebox
The presentation is a case study showcasing the technical details of Android security bug 8219321, disclosed to Google in February 2013, which allows hackers to modify an application's code without breaking the application's cryptographic signature. The vulnerability affects a wide number of Android devices, across generations & architectures, with little to no modifications of the exploit. The presentation will review how the vulnerability was located, how an exploit was created, and why the exploit works.
About Bluebox Security
Bluebox Security is a stealth startup focused on enterprise mobile security. Backed by Andreessen Horowitz, Sun Microsystems co-founder, Andreas von Bechtolsheim, SV Angel and Google Board member Ram Shriram, Bluebox Security is headquartered in San Francisco. For more information visit www.bluebox.com.
Media Contact
Katherine Nellums
LEWIS PR
+1.415.432.2451
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs