Your Company Name
Request a Demo
Request a Demo
Request a Demo
Request a Demo
Read More
Contents
Filters
No results match the search/filter criteria
Zero Trust Architecture: Mobile Application and Device Security for Federal Agencies
Exposing Security Risks for Commercial Mobile Devices
Q-vet Solution Brief
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Kryptowire Discovered Mobile Phone Firmware that Transmitted Personally Identifiable Information (PII) Without User Consent or Disclosure
Automating NIAP Requirements Testing for Mobile Apps
Mobile App Security and Privacy Transformational Assessment and Validation (NHS Apps Library)
NIST Special Publication 1800-22
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software
DEFInit: An Analysis of Exposed Android Init Routines
(Un)protected Broadcasts in Android 9 and 10
DHS Automated Vetting Process for Mobile Apps Could Cut Costs
Libra: Library Identification in Obfuscated Android Apps
Bootlooped: Assorted AOSP Attacks Against Availability
Healthcare Hacking & Protecting mHealth Apps
Resurrecting the READ_LOGS Permission on Samsung Devices
FirmScope: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
Is Banning TikTok the Right Approach or Are We Ignoring the Real Problem?
Forced-Path Execution for Android Applications on x86 Platforms
NIST Special Publication 1800-21
Looking Forward to 2024 & Reviewing Top Mobile Security & Privacy Trends in 2023
CISA Secure by Design intro
Detecting and Measuring Misconfigured Manifest in Android Apps
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities
Resilient and Scalable Cloned App Detection using Forced Execution and Compression Trees
101 Commands for the Unisoc AutoSLT Network
Michael Duffy on CISA’s Federal Enterprise Operations Cyber Alignment Plan
OIG Management Alert - ICE Management and Oversight of Mobile Applications
A New Directive Aims to Safeguard Federal Information: BOD 23-01
Protecting The Mobile Ecosystem - Part 2
Still Vulnerable Out of the Box: Revisiting the Security of Prepaid Android Carrier Devices
Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android Devices
Analysis of Content Copyright Infringement in Mobile Application Markets
Security Analysis of Simo’s vSIM Android Software
NIST Special Publication 800-163
How (Not) to Expose the Content of Notifications: A Historical Perspective on Samsung Android Smartphones
NIAP v1.4 Protection Profile for Application Software
Protecting The Mobile Ecosystem - Part 1
Safeguarding Federal Agency Mobile Applications and Devices
Thumbnails
Document Outline
Attachments
Layers
Current Outline Item
Previous
Next
Highlight All
Match Case
Match Diacritics
Whole Words
Color
Size
Color
Thickness
Opacity
Presentation Mode
Open
Print
Download
Current View
Go to First Page
Go to Last Page
Rotate Clockwise
Rotate Counterclockwise
Text Selection Tool
Hand Tool
Page Scrolling
Vertical Scrolling
Horizontal Scrolling
Wrapped Scrolling
No Spreads
Odd Spreads
Even Spreads
Document Properties…
Toggle Sidebar
Find
Previous
Next
Presentation Mode
Open
Print
Download
Current View
FreeText Annotation
Ink Annotation
Tools
Zoom Out
Zoom In
Automatic Zoom
Actual Size
Page Fit
Page Width
50%
75%
100%
125%
150%
200%
300%
400%
More Information
Less Information
Close
Enter the password to open this PDF file:
Cancel
OK
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Page Size:
-
Fast Web View:
-
Close
Preparing document for printing…
0%
Cancel
Share your details
to get mobile security insights relevant to you