Date Author Title

EMBEDDED DEVICES

2013-02-25Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2009-05-30John BambenekEmbedded Devices: An Avenue for Cyberterrorism?
2009-01-28Robert DanfordEmbedded device security assessment

EMBEDDED

2020-09-18/a>Xavier MertensA Mix of Python & VBA in a Malicious Word Document
2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2009-05-30/a>John BambenekEmbedded Devices: An Avenue for Cyberterrorism?
2009-01-28/a>Robert DanfordEmbedded device security assessment

DEVICES

2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2015-12-29/a>Daniel WesemannNew Years Resolutions
2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-04-26/a>Richard PorterDefine Irony: A medical device with a Virus?
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2009-05-30/a>John BambenekEmbedded Devices: An Avenue for Cyberterrorism?
2009-01-28/a>Robert DanfordEmbedded device security assessment