Chapter 11

Mobile Devices

IN THIS CHAPTER

Bullet Seeking out the common weaknesses in laptops, phones, and tablets

Bullet Executing security tests to uncover crucial mobile flaws

Bullet Exploring the security vulnerabilities associated with the Internet of Things (IoT)

Bullet Minimizing mobile security risks

Mobile computing is popular for business and hacking. It seems that everyone has a mobile device of some sort for personal or business use (usually both). If not properly secured, mobile devices connected to the enterprise network represent thousands upon thousands of unprotected islands of information floating about, out of your control.

Because of all the phones, tablets, and laptops running numerous operating system (OS) platforms chock-full of apps, an infinite number of risks are associated with mobile computing. Rather than delving into all the variables, this chapter explores some of the biggest, most common mobile security flaws that could affect you and your business.

Sizing Up Mobile Vulnerabilities

It pays to find and fix the low-hanging fruit on your network so that you get the most bang ...

Get Hacking For Dummies, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.