O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

In the event that your device has been compromised

Despite your best efforts, it is possible that your device or data may at some point suffer an attack. This can occur in multiple ways; the device may have been mistakenly left at a public place, or a hacker may have been successful in obtaining login information through a large-scale attack. Regardless of the reason, there are certain steps which you can take to mitigate the damages in the event that your device has been compromised.

Has your device been hacked?

First, you will need to verify that your devices or accounts have been hacked. Hackers will commonly use hacked devices to remotely send e-mails, place phone calls, or use SMS messaging. Therefore, users should carefully monitor their outgoing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required