Mobile IP Security
Until the latter part of the 1990s, mobile phones were predominantly voice only. The advent of 3G networks made high-quality Internet access from a mobile device a reality. The demand for data access became a torrent around 2010, with mobile data exceeding voice traffic across mobile carrier networks.
Unfortunately, cybercriminals were not far behind. This was mostly because phone manufacturers made instant and easy access a higher priority than basic security. As such, smartphones and tablets were enabled for Bluetooth discovery out-of-the-box. The criminal element rejoiced, because they now had direct access to these devices, which they could surreptitiously use to make voice calls, send data, listen to or transfer calls, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access