CHAPTER SUMMARY
The availability of applications drove the growth of smartphone subscribers, which in turn encouraged more subscribers in a virtuous (or vicious ) cycle, ultimately resulting in the creation of more mobile devices than people on this planet. This growth, of course, attracted a market for people keen on taking advantage of all the personal and private data collected on the app, creating yet more attack vectors for hackers, data thieves and miners to exploit.
Just as developers and manufacturers were getting their collective arms around this, the IoT revolution began, and now the number of connected devices comprises multiples of the world’s population. With each new use case, new attack vectors, exploits, and fixes are discovered ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access