Printer to PWND: Leveraging Multifunction Printers During Penetration Testing
TEAM JOCH vs. Android: The Ultimate Showdown
Hop Hacking Hedy
Printers Gone Wild!
Attacking 3G and 4G mobile telecommunications networks
Defeating mTANs for profit
Reverse Engineering Using the Android Emulator
URL Enlargement: Is it for You?
Malicious USB Devices:Is that an attack vector in your pocket or are you just happy to see me?
Transparent Botnet Control for Smartphones Over SMS