12 GOING INTO REVERSE

John Mitchell has spotted that attacks on mobile devices are coming from a different angle.

A few months ago I read an article from a technology journalist regarding the hijacking of his Apple iCloud account and the subsequent deletion of all the data on his iPhone and other devices. Note, it was the hypervisor that had been hijacked and not the device, which provided the back door into his phone.

This leads to all sorts of concerns over the security of mobile devices. Many of us will have loaded software to enable us find our phone if it is lost or stolen, and to remotely delete the data held on it at our instruction, but in this case the attack came from above rather than below, which raises the game somewhat.

Instead ...

Get Bring Your Own Device - The mobile computing challenge now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.