2011 06-sq lite-forensics
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Droidcon it-2014-marco-grassi-viaforensics
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-conference-2014
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile Penetration Testing: Episode III - Attack of the Code
How to make Android apps secure: dos and don’ts
5 things you must know to crush mobile security bugs
iOS and Android security: Differences you need to know
Shifting left: Continuous testing for better app quality and security
The fundamentals of Android and iOS app security
Mobile Penetration Testing: Episode 1 - The Forensic Menace
OWASP Mobile Top 10
Mobile Penetration Testing: Episode II - Attack of the Code
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Mobile pitfalls to avoid: The OWASP Top 10 Mobile Risks
How to scale mobile application security testing
It's not about you: Mobile security in 2016