It would be interesting to draw security conclusions from past vulnerabilities and 
accompanying solutions (patches, etc.). If possible connected to mobile wireless, but 
there is probably little to find there. Any compilation of results would be fine, 
covering as many platforms/OSs/SW languages/applications as possible. To answer the 
questions: Why did this have to happen? Were there no other (pro-active) solutions? 
What design and runtime procedures/processes were used? What can we apply for the 
future?

Anyone active in this field? Any reports published? I am not looking for statistics, 
but useful experience.

Results to be used in Mobile Internet Security training course for increasing security 
awareness.

Lennart Damm



_______________________________________________
Join Excite! - http://www.excite.com
The most personalized portal on the Web!

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to