Exploits, Tools, and Techniques

Every mobile phone—even those featuring the early, yet secure, Symbian OS—is vulnerable to basic forms of cyberattack. The early threats and vulnerabilities that come about from communication channels such as Short Message Service (SMS), Multimedia Message Service (MMS), Wi-Fi, and Bluetooth have always been a problem. With the advent of the smartphone, the scope of the risk has grown to encompass all forms of Internet threats including browser attacks, OS attacks such as remote jailbreaking (a method of circumventing provider-based security), Remote Access Trojans (RATs), rootkits, and the myriad types of malicious software already in the wild for PCs.

Mobile phone vulnerabilities and exploits can be categorized ...

Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.