Home Mobile

Below are the M3AAWG published materials related to our work on preventing and mitigating malware. There is also a Mobile video playlist on our YouTube channel at www.youtube.com/maawg and there are a few selected videos on our website in the Training Videos and Keynotes Videos sections under the Meetings menu tab.

Best Practices

March 31, 2017

M3AAWG Password Managers Usage Recommendations

Most users struggle to manage a large number of usernames and passwords.  While password managers have both proponents and detractors, these recommendations reflect the general consensus of the industry.

February 28, 2017

M3AAWG Password Recommendations for Account Providers

Passwords are used virtually everywhere.  This document provides password requirement recommendations for ISPs and other providers and briefly describes the risk model of using passwords to provide authorized or secure access to resources. It aims to improve end-user security by encouraging strong passwords.

August 26, 2015

M3AAWG Mobile Messaging Best Practices for Service Providers - Updated August 2015

These industry best practices are intended to help mitigate the abuse of mobile messaging (i.e., SMS, MMS and RCS), including text messaging and connected services. The guidelines outlined here will assist service providers and vendors in maintaining practical levels of trust and security across an open, globally-interconnected messaging environment. Updated August 2015.

June 08, 2015

Operation Safety-Net: Best Practices to Address Online, Mobile, and Telephony Threats

Written in plain language by M3AAWG and the London Action Plan (LAP), Operation Safety-Net outlines the current and emerging threats faced by consumers, businesses and governments with recommended best practices to address these threats. For a brief overview of the document, see the brochure explaining the global depth and breadth of these best practices in the Supporting Documents section from the For the Industry menu tab.

August 01, 2014

M3AAWG Telephony Honeypots: Benefits and Deployment Options

Honeypots are a proven technology used for detecting and understanding online threats that also can be used to fight telephony spam. This document was written to facilitate and encourage telephony honeypot development, as well as the use and sharing of information about and from those honeypots. It includes an overview of the benefits of such honeypots and also provides details of the various options that exist for setting them up.


Public Policy Comments

January 09, 2014

M3AAWG Response to Stakeholder Input on the Role of Governments, ITU-CWG on Internet-related Public Policy Issues

Submitted to the U.S. State Department in January 2014, responding to its request for Stakeholder Input on the Role of Governments, International Telecommunication Union Council Working Group on Internetprelated Public Policy Issues.

December 17, 2013

M3AAWG Comments on the WHOIS Misuse Study

Submitted to ICANN in response to their misuse survey report.

August 12, 2013

M3AAWG Comments on ICANN EWG Initial Report

Submitted to ICANN in August 2013 in response to ICANN's Expert Working Group report.

July 31, 2013

Response to CWG-Internet Request for Online Consultation-Combatting Spam

Submitted in July 2013 to the ITU Council Working Group on International Internet–Related Public Policy Issues (CWG–Internet) in response to a request for comments on effectively countering and combatting spam.

April 01, 2013

M3AAWG response to NIST Request for Information: Framework for Reducing Cyber Risks to Critical infrastructure

Submitted to the NIST in April 2013
Response to two questions in the National Institute of Standards and Technology Request for Information is also posted at the NIST site with comments from other organization


DM3Z Blog


Subscribe to Subscribe to News Releases