@matigo quite frankly neither do I, but baby steps.
Trend Micro Discovers Vulnerability That Renders Android Devices Silent http://ift.tt/1JuzbvG
Android security flaw: MMS Hack puts 950 million Android users at risk | BGR http://ift.tt/1Mx1BWY
Check Point to Uncover Certifi-gate, A New Android Threat, at Black Hat USA 2015 | Check Point Blog http://ift.tt/1KBf3K0
More #infosec bloggage by me: http://securitytheater.phoneboy.com/2015/07/30/the-right-way-to-inspect-ssh-connections/
Vendors who claim to be able to perform content filtering on decrypted SSH traffic are degrading the security of those connections in the process. The increased risks outweigh the benefits.
Lies, Damn Lies, and Inspecting SSH Traffic Securely [securitytheater.phoneboy.com]
#infosec
Firewalls that content inspect SSH connections degrade their security with only marginal benefits: Lies, Damn Lies, and Inspecting SSH Traffic Securely [securitytheater.phoneboy.com]