Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
DateAuthorTitle

MOBILE DEVICES

2012-10-02Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2010-10-20Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices

MOBILE

2014-07-28/a>Guy BruneauManagement and Control of Mobile Device Security
2014-04-01/a>Basil Alawi S.TaherUpgrading Your Android, Elevating My Malware
2012-12-03/a>Kevin ListonMobile Malware: Request for Field Reports
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2011-09-07/a>Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-07-19/a>Richard PorterSMS Phishing at the SANSFire 2011 Handler Dinner
2011-07-13/a>Guy BruneauAre Mobile Devices taking over your Corporate Network?
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2010-05-15/a>Deborah HaleOnboard Computers Subject to Attack?
2010-01-11/a>Johannes UllrichFake Android Application
2009-07-01/a>Bojan ZdrnjaMobile phone trojans
2008-11-25/a>Andre LudwigTmobile G1 handsets having DNS problems?
2008-07-15/a>Maarten Van HorenbeeckBlackBerry PDF parsing vulnerability

DEVICES

2013-02-25/a>Rob VandenBrinkSilent Traitors - Embedded Devices in your Datacenter
2012-10-02/a>Russ McReeCyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines
2012-04-26/a>Richard PorterDefine Irony: A medical device with a Virus?
2010-10-20/a>Jim ClausingCyber Security Awareness Month - Day 20 - Securing Mobile Devices
2009-05-30/a>John BambenekEmbedded Devices: An Avenue for Cyberterrorism?
2009-01-28/a>Robert DanfordEmbedded device security assessment