Chapter 11. Solutions in this chapter:

Introduction

While smartphones and highly mobile computing devices certainly present the possibility of great gains in efficiency and flexibility, they also present considerable risk. If you have read the other chapters, by now you have likely gained an appreciation of the complexity of these devices. You have seen how this complexity translates into potential vulnerability and how malware has begun to exploit these devices. Whether the vulnerabilities are in the software, hardware, or in the humans ...

Get Mobile Malware Attacks and Defense now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.