Date Author Title

MOBILE DEVICES

2015-12-29Daniel WesemannNew Years Resolutions
2012-10-02Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2010-10-20Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices

MOBILE

2022-11-17/a>Johannes UllrichLessons Learned from Automatic Failover: When 8.8.8.8 "disappears". IPv6 to the Rescue?
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-07/a>Johannes UllrichWhy I Gave Up on IPv6. And no, it is not because of security issues.
2020-06-05/a>Johannes UllrichCyber Security for Protests
2019-03-06/a>Johannes UllrichMarch Edition of Ouch! Newsletter: Securely Disposing Mobile Devices https://www.sans.org/security-awareness-training/resources/disposing-your-mobile-device
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2018-06-18/a>Xavier MertensMalicious JavaScript Targeting Mobile Browsers
2016-08-11/a>Pasquale StirparoLooking for the insider: Forensic Artifacts on iOS Messaging App
2015-12-29/a>Daniel WesemannNew Years Resolutions
2015-11-09/a>John BambenekProtecting Users and Enterprises from the Mobile Malware Threat
2014-07-28/a>Guy BruneauManagement and Control of Mobile Device Security
2014-04-01/a>Basil Alawi S.TaherUpgrading Your Android, Elevating My Malware
2012-12-03/a>Kevin ListonMobile Malware: Request for Field Reports
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2011-09-07/a>Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-07-19/a>Richard PorterSMS Phishing at the SANSFire 2011 Handler Dinner
2011-07-13/a>Guy BruneauAre Mobile Devices taking over your Corporate Network?
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2010-05-15/a>Deborah HaleOnboard Computers Subject to Attack?
2010-01-11/a>Johannes UllrichFake Android Application
2009-07-01/a>Bojan ZdrnjaMobile phone trojans
2008-11-25/a>Andre LudwigTmobile G1 handsets having DNS problems?
2008-07-15/a>Maarten Van HorenbeeckBlackBerry PDF parsing vulnerability

DEVICES

2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2015-12-29/a>Daniel WesemannNew Years Resolutions
2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-04-26/a>Richard PorterDefine Irony: A medical device with a Virus?
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2009-05-30/a>John BambenekEmbedded Devices: An Avenue for Cyberterrorism?
2009-01-28/a>Robert DanfordEmbedded device security assessment