Book description
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small—and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a low priority. Now, a certified ethical hacker explains in this book why this must change and how to change it. Packed with sobering examples of actual attacks, this unique resource shows you how to mount your counterattack.
Table of contents
- Copyright
- 1. 1Dedication
- 2. 2About the Author
- 3. 3Acknowledgements
- 4. 4What Is Blackjacking?
- I. Understanding the Threats and Devices
-
II. How BlackBerrys Are Hacked, and How to Protect Them
- 3. Exploiting BlackBerry Devices
- 4. Hacking the Supporting BlackBerry Infrastructure
- 5. Protecting Your PC and LAN from BlackBerrys
-
III. How PDAs Are Hacked, and How to Protect Them
- 6. Exploiting PDAs
- 7. Hacking the Supporting PDA Infrastructure
- 8. Protecting Your PC and LAN from PDAs
- IV. How Cell Phones Are Hacked, and How to Protect Them
- 1. References
Product information
- Title: Blackjacking
- Author(s):
- Release date: April 2007
- Publisher(s): Wiley
- ISBN: 9780470127544
You might also like
book
The Truth About Background and Reference Checks When Hiring
This Element is an excerpt from The Truth About Hiring the Best (9780132381864) by Cathy Fyock. …
book
Dear Hacker: Letters to the Editor of 2600
Actual letters written to the leading hackers' magazine For 25 years, 2600: The Hacker Quarterly has …
book
The Complete Idiot's Guide to Knowledge Management
You're no idiot, of course. You know that knowledge is power. However, teamwork is the key …
book
CCNP SWITCH 642-813 Quick Reference
As a final exam preparation tool, the CCNP Switch Quick Reference provides a concise review of …