O'Reilly logo

Hacking Exposed Mobile by Mike Price, John Steven, Scott Matsumoto, Swapnil Deshmukh, Sarath Geethakumar, Joel Scambray, Jason Rouse, Mike Stanfield, Neil Bergman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

APPENDIX ACONSUMER SECURITY CHECKLIST

This appendix highlights some of the options that end-users can adopt to ensure the security of private data and sensitive information stored on or accessed using their mobile devices. Mobile devices are no longer just for making calls and sending text messages. With the advent of smartphone technology, we are seeing a convergence of computing, mobility, and technology that makes user security awareness paramount for enabling a secure mobile ecosystem. The following is a compilation of recommendations we’ve collected from multiple resources during our mobile security travels, which we’ve found helpful both as users of these devices and, inevitably, as the go-to “expert” after something goes wrong with devices ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required