SANS Penetration Testing: Category - Mobile

iOS 10 is Apple's Gift to Android Users

How the latest update to iOS 10 will dramatically improve Android security At the Apple WWDC conference in June, Ivan Krstic, Apple Head of Security Engineering & Architecture, made a bold declaration: "At the end of 2016, Apple will make ATS mandatory for all developers who hope to submit their apps to the App Store." … Continue reading iOS 10 is Apple's Gift to Android Users


Mobile Device Security Checklist

By Lee Neely & Joshua Wright We often get asked for things we can do to help users keep their mobile devices secure. Here's a quick list of some simple things you can do to ensure that your mobile devices are running with at leastsomesecurity. All of these steps are free and raise the bar … Continue reading Mobile Device Security Checklist


TLS/SSL Failures and Some Thoughts on Cert Pinning (Part 1)

By Chris Crowley It's going to happen sooner or later...sooner probably. You're going to be asked about your company's mobile app or a mobile app your company wants to install across all mobile devices. They'll put the request in the "yet another duty as assigned" (YADAA) category/bucket. You look at the network traffic; it's using … Continue reading TLS/SSL Failures and Some Thoughts on Cert Pinning (Part 1)


What's the Deal with Mobile Device Passcodes and Biometrics? (Part 2 of 2)

By Lee Neely In the first installment of this 2-parter, I discussed the use of mobile device fingerprint scanners to unlock the device. As a follow-up, I'd like to discuss how a developer can integrate the scanner into their applications. This discussion may provide some insights into how to secure mobile apps, or even inspire … Continue reading What's the Deal with Mobile Device Passcodes and Biometrics? (Part 2 of 2)


What's the Deal with Mobile Device Passcodes and Biometrics? (Part 1 of 2)

By Lee Neely Introduction Mobile device administrators and end users need to be more cognizant of the risks of allowing unauthorized access to their smartphones and take steps to raise the bar on accessing those devices to mitigate those risks. This is part one of two articles on securing mobile device access. In this article, … Continue reading What's the Deal with Mobile Device Passcodes and Biometrics? (Part 1 of 2)