SlideShare a Scribd company logo
1 of 14
Download to read offline
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
010010101010100101100101010011111001001001010001010
Epidemic
what
is
the
Heartbleed
Brought to you by:
PASS IT ON
Click this button to share information on each slide.
CVE-2014-0160
Official designation is
CVE (Common Vulnerabilities and Exposures)
a vulnerability that exists
in the OpenSSL security
software, which is used to
create secure connections.
HEARTBLEED
VIEW THE INFOGRAPHIC
This vulnerability existed for 2 years
before it was caught!
VIEW THE INFOGRAPHIC
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
01001010101010010110010101001111100100100101000101
Version 1.0.1 of OpenSSL introduced
the vulnerability known as heartbleed,
and was released on March 14, 2012.
Heartbleed was discovered by Neel
Mehta, an engineer at Google Security,
and a team of security engineers (Riku,
Antti and Matti) at Finnish security
firm, Codenomicon.
!!!
VIEW THE INFOGRAPHIC
A computer that is on a secure
connection to a server will send out
a request to confirm that the
connection is still active.
The server takes that request and
stores the data.
Then it returns that same
packet of data.
This secure connection (SSL/TSL),
is called a “heartbeat.” It includes
two things: a payload, and padding.
HOW IT WORKS
VIEW THE INFOGRAPHIC
THIS IS WHERE THE BLEEDING HAPPENS
Servers using the protocol do not check to confirm that the
packet of data actually matches the size indicated.
So, for example, if a heartbeat was sent with
a single byte of data, and claimed to have
30 bytes of data.
Rather than confirm that the data was
only 1 byte, the server would grab not only
that, but the next 29 bytes from memory
as well and send it back the user.
VIEW THE INFOGRAPHIC
1 byte (30 bytes) (30 bytes)
VIEW THE INFOGRAPHIC
Imagine what could be in those extra 29 bytes?
No data is safe!
Passwords Addresses Full Names
Credit Card NumbersEncryption Keys
***
Social Security Numbers
VIEW THE INFOGRAPHIC
Not only that,
A malicious user could make as many heartbeat requests
as they’d like. With NO TRACE being left behind.
Including heavily trafficked websites such as:
Facebook, Google, YouTube and Wikipedia.
VIEW THE INFOGRAPHIC
are using the vulnerable
heartbeat extension.
About 500,000 sites
By automatically detecting, blocking and logging attempted
Heartbleed attacks, Blue Coat’s SSL Visibility Appliance provides
enterprises with the security assurance they require.
PROTECT & PREVENT
START NOW
Brought to you by:
VIEW THE INFOGRAPHIC
SOURCES:
http://heartbleed.com
http://vimeo.com/91425662
http://www.pewinternet.org/2014/04/30/heartbleeds-impact/
http://readwrite.com/2014/04/13/heartbleed-security-codenomicon-discovery#awesm=~oE3W6PSiCIxWOz
http://www.digitaltrends.com/mobile/heartbleed-bug-apps-affected-list/#!MOLoi

More Related Content

What's hot

Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxtharinduwije
 
E nodeb useful commands for rf engineer
E nodeb useful commands for rf engineerE nodeb useful commands for rf engineer
E nodeb useful commands for rf engineerVishal Padhya
 
3.oeo000020 lte call drop diagnosis issue 1
3.oeo000020 lte call drop diagnosis issue 13.oeo000020 lte call drop diagnosis issue 1
3.oeo000020 lte call drop diagnosis issue 1Klajdi Husi
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTEShashank Asthana
 
Megaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode BMegaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode Bshuklaritul
 
Lte principle
Lte principleLte principle
Lte principleHatim100
 
Gsm frequency-planning-issue2
Gsm frequency-planning-issue2Gsm frequency-planning-issue2
Gsm frequency-planning-issue2swatisabnis87
 
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enE nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enVugar Ali
 
Antennas: A Collection
Antennas: A CollectionAntennas: A Collection
Antennas: A Collection3G4G
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
 
[Ebook gratuito] Aprenda Três Exercícios Para Combater a ejaculação Precoce.
  [Ebook gratuito]  Aprenda Três Exercícios Para Combater a ejaculação Precoce.  [Ebook gratuito]  Aprenda Três Exercícios Para Combater a ejaculação Precoce.
[Ebook gratuito] Aprenda Três Exercícios Para Combater a ejaculação Precoce.Ejaculando Com Controle
 
Mahmoud mahfouz senior transmission engineer-cv
Mahmoud mahfouz senior transmission engineer-cvMahmoud mahfouz senior transmission engineer-cv
Mahmoud mahfouz senior transmission engineer-cvMahmoudEMahfouz
 
Sharing session huawei network optimization january 2015 ver3
Sharing session huawei network optimization january 2015 ver3Sharing session huawei network optimization january 2015 ver3
Sharing session huawei network optimization january 2015 ver3Arwan Priatna
 
Radio Network Design & Roll Out
Radio Network Design & Roll OutRadio Network Design & Roll Out
Radio Network Design & Roll OutRathnaKumar47
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parametersPagla Knight
 

What's hot (20)

topqualityvoice.pptx
topqualityvoice.pptxtopqualityvoice.pptx
topqualityvoice.pptx
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 
E nodeb useful commands for rf engineer
E nodeb useful commands for rf engineerE nodeb useful commands for rf engineer
E nodeb useful commands for rf engineer
 
3.oeo000020 lte call drop diagnosis issue 1
3.oeo000020 lte call drop diagnosis issue 13.oeo000020 lte call drop diagnosis issue 1
3.oeo000020 lte call drop diagnosis issue 1
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTE
 
Megaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode BMegaplexer Ip implementation in Enode B
Megaplexer Ip implementation in Enode B
 
Lte principle
Lte principleLte principle
Lte principle
 
Gsm frequency-planning-issue2
Gsm frequency-planning-issue2Gsm frequency-planning-issue2
Gsm frequency-planning-issue2
 
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enE nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
 
Antennas: A Collection
Antennas: A CollectionAntennas: A Collection
Antennas: A Collection
 
Telecom KPIs definitions
Telecom KPIs definitionsTelecom KPIs definitions
Telecom KPIs definitions
 
Modulo 1.pdf
Modulo 1.pdfModulo 1.pdf
Modulo 1.pdf
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
[Ebook gratuito] Aprenda Três Exercícios Para Combater a ejaculação Precoce.
  [Ebook gratuito]  Aprenda Três Exercícios Para Combater a ejaculação Precoce.  [Ebook gratuito]  Aprenda Três Exercícios Para Combater a ejaculação Precoce.
[Ebook gratuito] Aprenda Três Exercícios Para Combater a ejaculação Precoce.
 
Mahmoud mahfouz senior transmission engineer-cv
Mahmoud mahfouz senior transmission engineer-cvMahmoud mahfouz senior transmission engineer-cv
Mahmoud mahfouz senior transmission engineer-cv
 
Sharing session huawei network optimization january 2015 ver3
Sharing session huawei network optimization january 2015 ver3Sharing session huawei network optimization january 2015 ver3
Sharing session huawei network optimization january 2015 ver3
 
Radio Network Design & Roll Out
Radio Network Design & Roll OutRadio Network Design & Roll Out
Radio Network Design & Roll Out
 
Rach procedure in lte
Rach procedure in lteRach procedure in lte
Rach procedure in lte
 
Hsdpa analysis
Hsdpa analysisHsdpa analysis
Hsdpa analysis
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parameters
 

Viewers also liked

CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA InfographicBlue Coat
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat ServicesChessBall
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Takayoshi Takaoka
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeBlue Coat
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-idsecconf
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus NetworkBlue Coat
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationInvestorSymantec
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016InvestorSymantec
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 

Viewers also liked (12)

CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
How to master Blue Coat Proxy SG
How to master Blue Coat Proxy SGHow to master Blue Coat Proxy SG
How to master Blue Coat Proxy SG
 

Similar to What is Heartbleed?

Connecting the physical world to the cloud
Connecting the physical world to the cloudConnecting the physical world to the cloud
Connecting the physical world to the cloudAmazon Web Services
 
IoT State of the Union - IOT210 - re:Invent 2017
IoT State of the Union - IOT210 - re:Invent 2017IoT State of the Union - IOT210 - re:Invent 2017
IoT State of the Union - IOT210 - re:Invent 2017Amazon Web Services
 
AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0Amazon Web Services
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...Amazon Web Services
 
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기Amazon Web Services Korea
 
AWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
AWS Simple Workflow: Distributed Out of the Box! - Morning@LohikaAWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
AWS Simple Workflow: Distributed Out of the Box! - Morning@LohikaSerhiy Batyuk
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...Amazon Web Services
 
Big Data Will Change Our World
Big Data Will Change Our WorldBig Data Will Change Our World
Big Data Will Change Our WorldFliptop
 
How to use AWS IoT Analytics to unlock the value from IoT data
How to use AWS IoT Analytics to unlock the value from IoT dataHow to use AWS IoT Analytics to unlock the value from IoT data
How to use AWS IoT Analytics to unlock the value from IoT dataAmazon Web Services
 
How To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled ServicesHow To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled ServicesAppDynamics
 
[Infographic] Empower Your Business With Digital Business Transformation
[Infographic] Empower Your Business With Digital Business Transformation[Infographic] Empower Your Business With Digital Business Transformation
[Infographic] Empower Your Business With Digital Business TransformationCitrix
 
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018Amazon Web Services
 
Artificial intelligence (ai)
Artificial intelligence (ai)Artificial intelligence (ai)
Artificial intelligence (ai)Khushbu Arora
 
lastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetlastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetSerhat Cakmakoglu
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyDr. Wilfred Lin (Ph.D.)
 
Unlock the value of big data with the DX2000 from NEC - Infographic
Unlock the value of big data with the DX2000 from NEC - InfographicUnlock the value of big data with the DX2000 from NEC - Infographic
Unlock the value of big data with the DX2000 from NEC - InfographicPrincipled Technologies
 
Train your digital brain
Train your digital brain Train your digital brain
Train your digital brain TeodoraTenciu
 

Similar to What is Heartbleed? (20)

Connecting the physical world to the cloud
Connecting the physical world to the cloudConnecting the physical world to the cloud
Connecting the physical world to the cloud
 
IoT State of the Union - IOT210 - re:Invent 2017
IoT State of the Union - IOT210 - re:Invent 2017IoT State of the Union - IOT210 - re:Invent 2017
IoT State of the Union - IOT210 - re:Invent 2017
 
AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
 
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
[AWS Dev Day] 실습 워크샵 | AWS IoT와 SageMaker를 활용한 예지 정비의 구현하기
 
AWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
AWS Simple Workflow: Distributed Out of the Box! - Morning@LohikaAWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
AWS Simple Workflow: Distributed Out of the Box! - Morning@Lohika
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
 
Open source and its career benefits
Open source and its career benefitsOpen source and its career benefits
Open source and its career benefits
 
Big Data Will Change Our World
Big Data Will Change Our WorldBig Data Will Change Our World
Big Data Will Change Our World
 
How to use AWS IoT Analytics to unlock the value from IoT data
How to use AWS IoT Analytics to unlock the value from IoT dataHow to use AWS IoT Analytics to unlock the value from IoT data
How to use AWS IoT Analytics to unlock the value from IoT data
 
IoT State of the Union
IoT State of the UnionIoT State of the Union
IoT State of the Union
 
How To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled ServicesHow To Deliver a 5-Star Experience for IoT-Enabled Services
How To Deliver a 5-Star Experience for IoT-Enabled Services
 
[Infographic] Empower Your Business With Digital Business Transformation
[Infographic] Empower Your Business With Digital Business Transformation[Infographic] Empower Your Business With Digital Business Transformation
[Infographic] Empower Your Business With Digital Business Transformation
 
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
Customer Showcase for AWS IoT Analytics (IOT219) - AWS re:Invent 2018
 
Cdma basics
Cdma basicsCdma basics
Cdma basics
 
Artificial intelligence (ai)
Artificial intelligence (ai)Artificial intelligence (ai)
Artificial intelligence (ai)
 
lastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetlastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheet
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiency
 
Unlock the value of big data with the DX2000 from NEC - Infographic
Unlock the value of big data with the DX2000 from NEC - InfographicUnlock the value of big data with the DX2000 from NEC - Infographic
Unlock the value of big data with the DX2000 from NEC - Infographic
 
Train your digital brain
Train your digital brain Train your digital brain
Train your digital brain
 

More from Blue Coat

Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionBlue Coat
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicBlue Coat
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?Blue Coat
 
How To Catch A Hidden Spammer
How To Catch A Hidden SpammerHow To Catch A Hidden Spammer
How To Catch A Hidden SpammerBlue Coat
 

More from Blue Coat (8)

Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
How To Catch A Hidden Spammer
How To Catch A Hidden SpammerHow To Catch A Hidden Spammer
How To Catch A Hidden Spammer
 

Recently uploaded

A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 

Recently uploaded (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 

What is Heartbleed?