O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Protecting Your Mobile Devices

As you have learned from previous chapters, there is a staggering variety of methods that hackers can use to access your smartphone device without your permission. In this chapter, we will discuss the steps you can take to reduce the likelihood that your device will be hacked. We will also discuss the steps you can take in the event that you become the victim of an attack. You will learn about the following:

  • What identification numbers are used to identify your smartphone
  • Jailbreaking and rooting
  • The importance of strong passwords
  • Device encryption and antivirus
  • How to manage a compromised device
  • How you can protect yourself and your device, including protecting

Identifying your phone – the numbers that set your ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required