Book description
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small—and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a low priority. Now, a certified ethical hacker explains in this book why this must change and how to change it. Packed with sobering examples of actual attacks, this unique resource shows you how to mount your counterattack.
Table of contents
- Copyright
- 1. 1Dedication
- 2. 2About the Author
- 3. 3Acknowledgements
- 4. 4What Is Blackjacking?
- I. Understanding the Threats and Devices
-
II. How BlackBerrys Are Hacked, and How to Protect Them
- 3. Exploiting BlackBerry Devices
- 4. Hacking the Supporting BlackBerry Infrastructure
- 5. Protecting Your PC and LAN from BlackBerrys
-
III. How PDAs Are Hacked, and How to Protect Them
- 6. Exploiting PDAs
- 7. Hacking the Supporting PDA Infrastructure
- 8. Protecting Your PC and LAN from PDAs
- IV. How Cell Phones Are Hacked, and How to Protect Them
- 1. References
Product information
- Title: Blackjacking
- Author(s):
- Release date: April 2007
- Publisher(s): Wiley
- ISBN: 9780470127544
You might also like
book
Dear Hacker: Letters to the Editor of 2600
Actual letters written to the leading hackers' magazine For 25 years, 2600: The Hacker Quarterly has …
book
The Web Application Hacker's Handbook, 2nd Edition
The highly successful security book returns with a new edition, completely updated Web applications are the …
book
CISSP: Certified Information Systems Security Professional Study Guide, 6th Edition
Fully updated Sybex Study Guide for the industry-leading security certification: CISSP Security professionals consider the Certified …
book
CompTIA® Security+™ SY0-401 Exam Cram, Fourth Edition
The Publisher regrets that the CD/DVD content for this title cannot be made available Online. CompTIA® …