We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
replace the following links:
-[^19]: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.2068&rep=rep1&type=pdf -[^20]: https://www.lookout.com/blog/spoofed-wifi-60-minutes -[^37]: https://people.inf.ethz.ch/hvogt/proj/btmp3/Datasheets/Bluetooth_11_Specifications_Book.pdf -[^38]: https://www.bluetooth.com/bluetooth-resources/le-security-study-guide/ new -[^52]: https://www.nbcnewyork.com/investigations/sim-swapping-how-the-latest-cellphone-hacking-scam-works-and-how-to-protect-yourself/3686051/ -[^61]: https://docs.broadcom.com/doc/sans-mobile-threat-protection-a-holistic-approach -[^63]: https://web.cse.ohio-state.edu/~lin.3021/file/NDSS14b.pdf -[^65]: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=442543 -[^69]: delete -[^70]: https://kipdf.com/stumping-the-mobile-chipset_5afc4b768ead0ed8128b4574.html -[^80]: https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=87150717 -[^82]: https://www.fortiguard.com/psirt_policy -[^88]: https://www.lookout.com/blog/bankmirage -[^89]: http://www.stratusvideo.org/download/stratus_video-ios9_trust.pdf -[^91]: https://www.lookout.com/blog/hacking-team -[^94]: (new) https://news.softpedia.com/news/android-malware-secretly-subscribes-victims-to-premium-sms-services-491264.shtml -[^95]: https://www.zdnet.com/google-amp/article/chinese-android-botnet-netting-millions-says-symantec/ -[^102]: https://www.lookout.com/blog/brain-test-re-emerges -[^114]: https://blog.checkpoint.com/2015/08/06/certifigate/ -[^115]: (new) https://threatpost.com/samsungs-swift-keyboard-update-mechanism-exposes-600m-devices/113348/ -[^127]: https://www.zdnet.com/google-amp/article/ios-9-lockscreen-bypass-exposes-photos-and-contacts/ -[^133]: https://www.globalsecuritymag.com/Marc-Rogers-Loockout-Why-I-hacked,20140923,47611.html -[^134]: https://www.lookout.com/blog/spoofed-wifi-60-minutes -[^136]: https://owasp.org/www-community/attacks/Manipulator-in-the-middle_attack -[^144]: https://dl.acm.org/doi/pdf/10.1145/1920261.1920314?casa_token=5XmsJ5lz06EAAAAA:HavUpmf81lNQ74ooinjWS1BZkQMkfhsbWJwFwa3UEieHGYKTCmv-TSwwaHRQhz-I4XFzdzkDHEOA -[^167]: https://arxiv.org/pdf/1607.05171.pdf -[^188]: https://www.nowsecure.com/blog/2017/09/24/remote-ussd-code-execution-on-android-devices/ -[^193]: https://unit42.paloaltonetworks.com/backstab-mobile-backup-data-under-attack-from-malware/ -[^217]: https://papers.put.as/papers/ios/2013/US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-WP.pdf -[^225]: https://www.lookout.com/blog/phone-theft-in-america -[^234]: https://duo.com/resources/infographics/the-state-of-android-security -[^240]: https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_slides.pdf -[^S-Konstantaras-1]: https://dokumen.tips/documents/exploiting-vulnerabilities-of-wi-fi-sd-cards-os3nl-vulnerabilities-of-wi-fi-sd.html -[^307]: https://www.srlabs.de/bites/new-sim-attacks -[^309]: https://www.fintechfutures.com/files/2014/04/Secure-Element-Deployment-Host-Card-Emulation-v1.0.pdf -[^310]: https://www.securetechalliance.org/wp-content/uploads/HCE-101-WP-FINAL-081114-clean.pdf
The text was updated successfully, but these errors were encountered:
Successfully merging a pull request may close this issue.
replace the following links:
-[^19]: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.2068&rep=rep1&type=pdf
-[^20]: https://www.lookout.com/blog/spoofed-wifi-60-minutes
-[^37]: https://people.inf.ethz.ch/hvogt/proj/btmp3/Datasheets/Bluetooth_11_Specifications_Book.pdf
-[^38]: https://www.bluetooth.com/bluetooth-resources/le-security-study-guide/ new
-[^52]: https://www.nbcnewyork.com/investigations/sim-swapping-how-the-latest-cellphone-hacking-scam-works-and-how-to-protect-yourself/3686051/
-[^61]: https://docs.broadcom.com/doc/sans-mobile-threat-protection-a-holistic-approach
-[^63]: https://web.cse.ohio-state.edu/~lin.3021/file/NDSS14b.pdf
-[^65]: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=442543
-[^69]: delete
-[^70]: https://kipdf.com/stumping-the-mobile-chipset_5afc4b768ead0ed8128b4574.html
-[^80]: https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=87150717
-[^82]: https://www.fortiguard.com/psirt_policy
-[^88]: https://www.lookout.com/blog/bankmirage
-[^89]: http://www.stratusvideo.org/download/stratus_video-ios9_trust.pdf
-[^91]: https://www.lookout.com/blog/hacking-team
-[^94]: (new) https://news.softpedia.com/news/android-malware-secretly-subscribes-victims-to-premium-sms-services-491264.shtml
-[^95]: https://www.zdnet.com/google-amp/article/chinese-android-botnet-netting-millions-says-symantec/
-[^102]: https://www.lookout.com/blog/brain-test-re-emerges
-[^114]: https://blog.checkpoint.com/2015/08/06/certifigate/
-[^115]: (new) https://threatpost.com/samsungs-swift-keyboard-update-mechanism-exposes-600m-devices/113348/
-[^127]: https://www.zdnet.com/google-amp/article/ios-9-lockscreen-bypass-exposes-photos-and-contacts/
-[^133]: https://www.globalsecuritymag.com/Marc-Rogers-Loockout-Why-I-hacked,20140923,47611.html
-[^134]: https://www.lookout.com/blog/spoofed-wifi-60-minutes
-[^136]: https://owasp.org/www-community/attacks/Manipulator-in-the-middle_attack
-[^144]: https://dl.acm.org/doi/pdf/10.1145/1920261.1920314?casa_token=5XmsJ5lz06EAAAAA:HavUpmf81lNQ74ooinjWS1BZkQMkfhsbWJwFwa3UEieHGYKTCmv-TSwwaHRQhz-I4XFzdzkDHEOA
-[^167]: https://arxiv.org/pdf/1607.05171.pdf
-[^188]: https://www.nowsecure.com/blog/2017/09/24/remote-ussd-code-execution-on-android-devices/
-[^193]: https://unit42.paloaltonetworks.com/backstab-mobile-backup-data-under-attack-from-malware/
-[^217]: https://papers.put.as/papers/ios/2013/US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-WP.pdf
-[^225]: https://www.lookout.com/blog/phone-theft-in-america
-[^234]: https://duo.com/resources/infographics/the-state-of-android-security
-[^240]: https://www.ndss-symposium.org/wp-content/uploads/2017/09/10_5_slides.pdf
-[^S-Konstantaras-1]: https://dokumen.tips/documents/exploiting-vulnerabilities-of-wi-fi-sd-cards-os3nl-vulnerabilities-of-wi-fi-sd.html
-[^307]: https://www.srlabs.de/bites/new-sim-attacks
-[^309]: https://www.fintechfutures.com/files/2014/04/Secure-Element-Deployment-Host-Card-Emulation-v1.0.pdf
-[^310]: https://www.securetechalliance.org/wp-content/uploads/HCE-101-WP-FINAL-081114-clean.pdf
The text was updated successfully, but these errors were encountered: