This appendix highlights some of the options that end-users can adopt to ensure the security of private data and sensitive information stored on or accessed using their mobile devices. Mobile devices are no longer just for making calls and sending text messages. With the advent of smartphone technology, we are seeing a convergence of computing, mobility, and technology that makes user security awareness paramount for enabling a secure mobile ecosystem. The following is a compilation of recommendations we’ve collected from multiple resources during our mobile security travels, which we’ve found helpful both as users of these devices and, inevitably, as the go-to “expert” after something goes wrong with devices ...

Get Hacking Exposed Mobile now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.