Description |
1 online resource (xxv, 409 pages) : illustrations |
Bibliography |
Includes bibliographical references and index. |
Contents |
Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures. |
Summary |
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices. |
Subject |
Cell phone systems -- Security measures.
|
|
Mobile communication systems -- Security measures.
|
|
Mobile computing -- Security measures.
|
|
Computer crimes -- Prevention.
|
|
Computer crimes -- Case studies.
|
|
Hackers.
|
|
Wireless Internet -- Security measures.
|
|
Téléphonie cellulaire -- Sécurité -- Mesures. |
|
Radiocommunications mobiles -- Sécurité -- Mesures. |
|
Informatique mobile -- Sécurité -- Mesures. |
|
Criminalité informatique -- Études de cas. |
|
Pirates informatiques. |
|
Internet mobile -- Sécurité -- Mesures. |
|
Computer crimes |
|
Computer crimes -- Prevention |
|
Hackers |
Genre |
Case studies
|
Added Author |
Dunham, Ken.
|
|
Abu-Nimeh, Saeed.
|
Other Form: |
Print version: Mobile malware attacks and defense. Burlington, MA : Elsevier, ©2009 9781597492980 (DLC) 2008042884 (OCoLC)229025908 |
ISBN |
1597492981 |
|
9781597492980 |
|
9780080949192 (electronic bk.) |
|
0080949193 (electronic bk.) |
|