2022-11-17 | Johannes Ullrich | Lessons Learned from Automatic Failover: When 8.8.8.8 "disappears". IPv6 to the Rescue? |
2021-09-24 | Xavier Mertens | Keep an Eye on Your Users Mobile Devices (Simple Inventory) |
2021-09-07 | Johannes Ullrich | Why I Gave Up on IPv6. And no, it is not because of security issues. |
2020-06-05 | Johannes Ullrich | Cyber Security for Protests |
2019-03-06 | Johannes Ullrich | March Edition of Ouch! Newsletter: Securely Disposing Mobile Devices https://www.sans.org/security-awareness-training/resources/disposing-your-mobile-device |
2019-01-30 | Russ McRee | CR19-010: The United States vs. Huawei |
2018-06-18 | Xavier Mertens | Malicious JavaScript Targeting Mobile Browsers |
2016-08-11 | Pasquale Stirparo | Looking for the insider: Forensic Artifacts on iOS Messaging App |
2015-12-29 | Daniel Wesemann | New Years Resolutions |
2015-11-09 | John Bambenek | Protecting Users and Enterprises from the Mobile Malware Threat |
2014-07-28 | Guy Bruneau | Management and Control of Mobile Device Security |
2014-04-01 | Basil Alawi S.Taher | Upgrading Your Android, Elevating My Malware |
2012-12-03 | Kevin Liston | Mobile Malware: Request for Field Reports |
2012-10-02 | Russ McRee | Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines |
2011-09-07 | Lenny Zeltser | Analyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools |
2011-07-19 | Richard Porter | SMS Phishing at the SANSFire 2011 Handler Dinner |
2011-07-13 | Guy Bruneau | Are Mobile Devices taking over your Corporate Network? |
2010-10-20 | Jim Clausing | Cyber Security Awareness Month - Day 20 - Securing Mobile Devices |
2010-05-15 | Deborah Hale | Onboard Computers Subject to Attack? |
2010-01-11 | Johannes Ullrich | Fake Android Application |
2009-07-01 | Bojan Zdrnja | Mobile phone trojans |
2008-11-25 | Andre Ludwig | Tmobile G1 handsets having DNS problems? |
2008-07-15 | Maarten Van Horenbeeck | BlackBerry PDF parsing vulnerability |