O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we discussed:

  • Personal and device identification numbers
  • Preventative measures to discourage hackers
  • How to create strong passwords
  • The disadvantages of reusing passwords
  • Data encryption on smartphones
  • How to research apps
  • Signs that a device has been hacked
  • SMS messaging attacks
  • Trojans in applications and attachments
  • What to do if an account has been compromised
  • How to wipe a smartphone

In the next chapter we will see how to get your device serviced in the event of a significant malfunction.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required