iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies
Protecting the Crown Jewels from Devastating Data Breaches
Visualizing Threats: Network Visualization for Cyber Security
The State of iOS Security
Crowd strike global_threat_report_2013
Spo1 r31 spo1-r31
Carbanak : Bank Robbery Like Never Before
BITGLASS - DATA BREACH DISCOVERY DATASHEET
Shmoocon Epilogue 2013 - Ruining security models with SSH
Malware analysis
Prevoty-Enterprise_Tech_Overview