Mobile Software Exploits and Remediation

Like all network-based devices, mobile devices are subject to attacks that seek to exploit holes, backdoors, or other weakness in the software responsible for running the basic functions, the communication protocols, and the applications that reside on the device. Given the combination of varied usage patterns, broad adoption, relative newness, and complex software, it’s no surprise that mobile devices are attractive targets for hackers and cybercriminals.

FYI

These mobile risks and the required remediation are primarily the concern of developers rather than IT security specialists. However, it helps for IT security specialists to understand these issues. These personnel are “downstream”; as such, if ...

Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.