Your Company Name
Request a Demo
Request a Demo
Request a Demo
Request a Demo
Read More
Contents
Filters
No results match the search/filter criteria
Zero Trust Architecture: Mobile Application and Device Security for Federal Agencies
Exposing Security Risks for Commercial Mobile Devices
Addressing the OWASP Mobile Top 10 2024 Requirements
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Kryptowire Discovered Mobile Phone Firmware that Transmitted Personally Identifiable Information (PII) Without User Consent or Disclosure
Automating NIAP Requirements Testing for Mobile Apps
NIST Special Publication 1800-22
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software
What Is Vulnerability Management?
Defense in Depth: How MAST and Pen Testing Work Together
DEFInit: An Analysis of Exposed Android Init Routines
(Un)protected Broadcasts in Android 9 and 10
Q-mast Solution Brief
DHS Automated Vetting Process for Mobile Apps Could Cut Costs
Q-mast for Federal Agencies
Libra: Library Identification in Obfuscated Android Apps
Bootlooped: Assorted AOSP Attacks Against Availability
Healthcare Hacking & Protecting mHealth Apps
Resurrecting the READ_LOGS Permission on Samsung Devices
FirmScope: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
What Is Mobile Security? And Why Is Mobile App Security Testing Important?
DevSecOps Adoption for Federal Agencies
Forced-Path Execution for Android Applications on x86 Platforms
NIST Special Publication 1800-21
Looking Forward to 2024 & Reviewing Top Mobile Security & Privacy Trends in 2023
CISA Secure by Design intro
Q-mast for Banking
Detecting and Measuring Misconfigured Manifest in Android Apps
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities
Resilient and Scalable Cloned App Detection using Forced Execution and Compression Trees
101 Commands for the Unisoc AutoSLT Network
Michael Duffy on CISA’s Federal Enterprise Operations Cyber Alignment Plan
A New Directive Aims to Safeguard Federal Information: BOD 23-01
What Are Supply Chain Attacks? And Why Should I Care?
Protecting The Mobile Ecosystem - Part 2
Still Vulnerable Out of the Box: Revisiting the Security of Prepaid Android Carrier Devices
Start Arbitrary Activity App Components as the System User Vulnerability Affecting Samsung Android Devices
Q-mast Sample Report
Analysis of Content Copyright Infringement in Mobile Application Markets
Is Your Mobile App Supply Chain Putting Your Organization at Risk?
Security Analysis of Simo’s vSIM Android Software
NIST Special Publication 800-163
How (Not) to Expose the Content of Notifications: A Historical Perspective on Samsung Android Smartphones
NIAP v1.4 Protection Profile for Application Software
Mobile Application Security Best Practices for Fintech Apps
Protecting The Mobile Ecosystem - Part 1
Q-mast for Medical Schools
Safeguarding Federal Agency Mobile Applications and Devices
Thumbnails
Document Outline
Attachments
Layers
Current Outline Item
Previous
Next
Highlight All
Match Case
Match Diacritics
Whole Words
Color
Size
Color
Thickness
Opacity
Presentation Mode
Open
Print
Download
Current View
Go to First Page
Go to Last Page
Rotate Clockwise
Rotate Counterclockwise
Text Selection Tool
Hand Tool
Page Scrolling
Vertical Scrolling
Horizontal Scrolling
Wrapped Scrolling
No Spreads
Odd Spreads
Even Spreads
Document Properties…
Toggle Sidebar
Find
Previous
Next
Presentation Mode
Open
Print
Download
Current View
FreeText Annotation
Ink Annotation
Tools
Zoom Out
Zoom In
Automatic Zoom
Actual Size
Page Fit
Page Width
50%
75%
100%
125%
150%
200%
300%
400%
More Information
Less Information
Close
Enter the password to open this PDF file:
Cancel
OK
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Page Size:
-
Fast Web View:
-
Close
Preparing document for printing…
0%
Cancel