March 2021
Intermediate to advanced
400 pages
14h 24m
English
The availability of applications drove the growth of smartphone subscribers, which in turn encouraged more subscribers in a virtuous (or viscous) cycle that resulted in the creation of more mobile devices than people on this planet. This growth of course attracted a market for people keen on taking advantage of all the personal and private data collected on the app, creating yet more attack vectors for hackers and data thieves and miners to exploit.
Just as developers, and manufacturers, were getting their collective arms around this, the IoT revolution began, and now the number of connected devices is multiples of the world’s population. With each new use case, new attack vectors, exploits, and fixes are discovered and deployed. ...