Your Company Name
Request a Demo
Request a Demo
Request a Demo
Request a Demo
Read More
No results match the search/filter criteria
Addressing the OWASP Mobile Top 10 2024 Requirements
Featured
Zero Trust Architecture: Mobile Application and Device Security for Federal Agencies
Featured
What Is Vulnerability Management?
Featured
What Is Mobile Security? And Why Is Mobile App Security Testing Important?
Featured
What Are Supply Chain Attacks? And Why Should I Care?
Featured
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software
Featured
Safeguarding Federal Agency Mobile Applications and Devices
Featured
Resilient and Scalable Cloned App Detection using Forced Execution and Compression Trees
Featured
Q-mast Solution Brief
Featured
(Un)protected Broadcasts in Android 9 and 10
Featured
101 Commands for the Unisoc AutoSLT Network
Featured
Bootlooped: Assorted AOSP Attacks Against Availability
Featured
Exposing Security Risks for Commercial Mobile Devices
Featured
How (Not) to Expose the Content of Notifications: A Historical Perspective on Samsung Android Smartphones
Featured
Kryptowire Discovered Mobile Phone Firmware that Transmitted Personally Identifiable Information (PII) Without User Consent or Disclosure
Featured
Resurrecting the READ_LOGS Permission on Samsung Devices
Featured
Security Analysis of Simo’s vSIM Android Software
Featured
Still Vulnerable Out of the Box: Revisiting the Security of Prepaid Android Carrier Devices
Featured
Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android Devices
Featured
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Featured
A New Directive Aims to Safeguard Federal Information: BOD 23-01
Featured
Analysis of Content Copyright Infringement in Mobile Application Markets
Featured
Automating NIAP Requirements Testing for Mobile Apps
Featured
CISA Secure by Design intro
Featured
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities
Featured
Defense in Depth: How MAST and Pen Testing Work Together
Featured
DEFInit: An Analysis of Exposed Android Init Routines
Featured
Detecting and Measuring Misconfigured Manifest in Android Apps
Featured
DevSecOps Adoption for Federal Agencies
Featured
DHS Automated Vetting Process for Mobile Apps Could Cut Costs
Featured
FirmScope: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
Featured
Forced-Path Execution for Android Applications on x86 Platforms
Featured
Healthcare Hacking & Protecting mHealth Apps
Featured
Is Your Mobile App Supply Chain Putting Your Organization at Risk?
Featured
Libra: Library Identification in Obfuscated Android Apps
Featured
Looking Forward to 2024 & Reviewing Top Mobile Security & Privacy Trends in 2023
Featured
Michael Duffy on CISA’s Federal Enterprise Operations Cyber Alignment Plan
Featured
Mobile Application Security Best Practices for Fintech Apps
Featured
NIAP v1.4 Protection Profile for Application Software
Featured
Protecting The Mobile Ecosystem - Part 1
Featured
Protecting The Mobile Ecosystem - Part 2
Featured
Q-mast for Banking
Featured
Q-mast for Federal Agencies
Featured
Q-mast for Medical Schools
Featured
Q-mast Sample Report
Featured
NIST Special Publication 800-163
Featured
NIST Special Publication 1800-22
Featured
NIST Special Publication 1800-21
Featured
Addressing the OWASP Mobile Top 10
Featured
Implications of TikTok ban on the future of mobile security
Featured
Contextual Mobile Security Intelligence
Featured
Mobile App Security Solutions
Featured
Thumbnails
Document Outline
Attachments
Layers
Current Outline Item
Previous
Next
Highlight All
Match Case
Match Diacritics
Whole Words
Color
Size
Color
Thickness
Opacity
Presentation Mode
Open
Print
Download
Current View
Go to First Page
Go to Last Page
Rotate Clockwise
Rotate Counterclockwise
Text Selection Tool
Hand Tool
Page Scrolling
Vertical Scrolling
Horizontal Scrolling
Wrapped Scrolling
No Spreads
Odd Spreads
Even Spreads
Document Properties…
Toggle Sidebar
Find
Previous
Next
Presentation Mode
Open
Print
Download
Current View
FreeText Annotation
Ink Annotation
Tools
Zoom Out
Zoom In
Automatic Zoom
Actual Size
Page Fit
Page Width
50%
75%
100%
125%
150%
200%
300%
400%
More Information
Less Information
Close
Enter the password to open this PDF file:
Cancel
OK
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Page Size:
-
Fast Web View:
-
Close
Preparing document for printing…
0%
Cancel