Date Author Title

MOBILE POLICIES

2014-07-28Guy BruneauManagement and Control of Mobile Device Security

MOBILE

2022-11-17/a>Johannes UllrichLessons Learned from Automatic Failover: When 8.8.8.8 "disappears". IPv6 to the Rescue?
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-09-07/a>Johannes UllrichWhy I Gave Up on IPv6. And no, it is not because of security issues.
2020-06-05/a>Johannes UllrichCyber Security for Protests
2019-03-06/a>Johannes UllrichMarch Edition of Ouch! Newsletter: Securely Disposing Mobile Devices https://www.sans.org/security-awareness-training/resources/disposing-your-mobile-device
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2018-06-18/a>Xavier MertensMalicious JavaScript Targeting Mobile Browsers
2016-08-11/a>Pasquale StirparoLooking for the insider: Forensic Artifacts on iOS Messaging App
2015-12-29/a>Daniel WesemannNew Years Resolutions
2015-11-09/a>John BambenekProtecting Users and Enterprises from the Mobile Malware Threat
2014-07-28/a>Guy BruneauManagement and Control of Mobile Device Security
2014-04-01/a>Basil Alawi S.TaherUpgrading Your Android, Elevating My Malware
2012-12-03/a>Kevin ListonMobile Malware: Request for Field Reports
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2011-09-07/a>Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-07-19/a>Richard PorterSMS Phishing at the SANSFire 2011 Handler Dinner
2011-07-13/a>Guy BruneauAre Mobile Devices taking over your Corporate Network?
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2010-05-15/a>Deborah HaleOnboard Computers Subject to Attack?
2010-01-11/a>Johannes UllrichFake Android Application
2009-07-01/a>Bojan ZdrnjaMobile phone trojans
2008-11-25/a>Andre LudwigTmobile G1 handsets having DNS problems?
2008-07-15/a>Maarten Van HorenbeeckBlackBerry PDF parsing vulnerability

POLICIES

2014-07-28/a>Guy BruneauManagement and Control of Mobile Device Security
2010-06-09/a>Deborah HaleBest Practice to Prevent PDF Attacks