CHAPTER 1THE MOBILE RISK ECOSYSTEM

Mobile malware, BYOD, lions, tigers, and bears, oh my. Where to start with mobile security? Is mobile an entirely new paradigm that should cause us to reevaluate everything we’ve tried before? Or just a more aggressive flavor of client-server computing? Naturally inclined to fear, uncertainty, and doubt (FUD)—and to selling you more products—the technology industry won’t provide a compelling answer. Neither will its distant cousin, the security industry. We’ll try to disentangle the lies and videotape in this chapter.

THE MOBILE ECOSYSTEM

A famous line from Aladdin, one of our favorite movies is: “Phenomenal cosmic power—itty bitty living space.” This describes the mobile ecosystem exactly. Perhaps at no other ...

Get Hacking Exposed Mobile now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.