Skip to Content
Bring Your Own Device - The mobile computing challenge
book

Bring Your Own Device - The mobile computing challenge

by BCS, The Chartered Institute for IT
May 2013
Intermediate to advanced
46 pages
1h 22m
English
BCS Learning & Development Limited
Content preview from Bring Your Own Device - The mobile computing challenge

12 GOING INTO REVERSE

John Mitchell has spotted that attacks on mobile devices are coming from a different angle.

A few months ago I read an article from a technology journalist regarding the hijacking of his Apple iCloud account and the subsequent deletion of all the data on his iPhone and other devices. Note, it was the hypervisor that had been hijacked and not the device, which provided the back door into his phone.

This leads to all sorts of concerns over the security of mobile devices. Many of us will have loaded software to enable us find our phone if it is lost or stolen, and to remotely delete the data held on it at our instruction, but in this case the attack came from above rather than below, which raises the game somewhat.

Instead ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Bring Your Own Devices (BYOD) Survival Guide

Bring Your Own Devices (BYOD) Survival Guide

Jessica Keyes
What Employees Want Most in Uncertain Times

What Employees Want Most in Uncertain Times

Kristine W. Powers, Jessica B.B. Diaz
BYOD for Healthcare

BYOD for Healthcare

Jessica Keyes

Publisher Resources

ISBN: 9781780171890Purchase book