Chapter 9. Solutions in this chapter:
- Investigating Mobile Forensics
- Deploying Mobile Forensic Tools
- PDA and Smartphone Forensics
- Operating Systems
- Mobile Device Assets & MM Payloads
- Performing Blackberry Forensics
- Performing iPhone Forensics
- Forensic Investigation of MM on a Mobile Device
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Introduction
In this chapter, we will discuss the concept of conducting a forensic investigation on data that has been read, stored, or manipulated on some type of mobile device. In particular, we will focus on the techniques for investigating malicious code and its impact on a mobile device.
Many of the attacks on mobiles are similar to that of the more traditional storage devices; however, some notable ...
Get Mobile Malware Attacks and Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.