O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Steps you can take to protect yourself

If you are using a smartphone, tablet, or any other mobile device, follow these guidelines to protect yourself:

  • Always use extra caution and install only approved applications available through your vendor's official application store.

    Also, be sure to check any feedback from the download site. This can clue you into any known issues.

  • Do not jailbreak or root your smartphone or tablet computer, as this disables critical security features in the device's operating system.
  • Before using Wi-Fi hotspot functionality, including smartphones and portable hotspot devices, WPA2 Wi-Fi encryption security must be enabled and configured with a strong password to prevent unauthorized access to the Wi-Fi network created by ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required