Brief Table of Contents
Chapter 1. Introduction to Mobile MalwareSolutions in this chapter:
Chapter 2. Visual PayloadsSolutions in this chapter:
Chapter 3. Timeline of Mobile Malware, Hoaxes, and ThreatsSolutions in this chapter:
Chapter 4. Overview of Mobile Malware FamiliesSolutions in this chapter:
Chapter 5. Taxonomy of Mobile MalwareSolutions in this chapter:
Chapter 6. Phishing, SMishing, and VishingSolutions in this chapter
Chapter 7. Operating System and Device VulnerabilitiesSolutions in this chapter:
Chapter 8. Analyzing Mobile MalwareSolutions in this chapter:
Chapter 9. Forensic Analysis of Mobile MalwareSolutions in this chapter:
Get Mobile Malware Attacks and Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.