O'Reilly logo

Hacking Exposed Mobile Security Secrets & Solutions by Mike Price, John Steven, Scott Matsumoto, Swapnil Deshmukh, Sarath Geethakumar, Joel Scambray, Jason Rouse, Mike Stanfield, Neil Bergman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 1THE MOBILE RISK ECOSYSTEM

Mobile malware, BYOD, lions, tigers, and bears, oh my. Where to start with mobile security? Is mobile an entirely new paradigm that should cause us to reevaluate everything we’ve tried before? Or just a more aggressive flavor of client-server computing? Naturally inclined to fear, uncertainty, and doubt (FUD)—and to selling you more products—the technology industry won’t provide a compelling answer. Neither will its distant cousin, the security industry. We’ll try to disentangle the lies and videotape in this chapter.

THE MOBILE ECOSYSTEM

A famous line from Aladdin, one of our favorite movies is: “Phenomenal cosmic power—itty bitty living space.” This describes the mobile ecosystem exactly. Perhaps at no other ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required