March 2021
Intermediate to advanced
400 pages
14h 24m
English
Until the latter part of the noughties, mobile phones were predominantly voice only. The advent of 3G networks made high-quality Internet access from a mobile device a reality. The demand for data access soon became a torrent around 2010, with mobile data exceeding voice traffic across mobile carrier networks.
Unfortunately, cybercriminals were not far behind. This was mostly because phone manufacturers made instant and easy access a higher priority than basic security. As such, smartphones and tablets were enabled for Bluetooth discovery out-of-the-box. The criminal element rejoiced, because they now had direct access to these devices, which they could surreptitiously use to make voice calls, send data, listen to or transfer ...