Chapter 9

Summary and Call to Action

Abstract

We all have choices about how we implement and use technology, making our own personal cost/benefit calculation about our appetite for risk versus convenience and prioritizing actions (or inactions) accordingly. Hacks are continually evolving, forcing updates to mitigation approaches that combat the hacks. The number of WAPs and mobile devices are increasing (with some devices acting as both access points and mobile devices) as the IoT, self-driving cars and self-flying drones become a reality. New hacks will be created for these new environments. Because of this, mobile device risk management is an ongoing journey, not a destination. Money is not a reasonable excuse for not having a security plan for ...

Get Hacking Wireless Access Points now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.