O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Mobile and Social – the Threats You Should Know About

Due to the increasing use of smart and mobile phones, the threats against these mobile devices have increased/risen over the last few years. We will take an in-depth look at various scams, phishing, spear phishing, social engineering, Cloud security, viruses, worms, and other threats a user may encounter, and future threats.

In this chapter, we will review various threats that you need to be aware of. They are as follows:

  • Scams
  • Malware
  • SMS spoofing
  • Social engineering
  • Phishing
  • Cloud computing
  • Virus

A prediction of the future (and the lottery numbers for next week) scams

Security threats, such as malware, are starting to be manifested on mobile devices, as we are learning that mobile devices ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required