O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

In the event of a hack

You've determined to the best of your ability that your device has been hacked. At the very least, you've determined that your device is demonstrating behavior that you cannot otherwise explain. The following are the steps you should take depending on the particulars of your hack.

The device type (BYOD or the corporate device)

Depending on whether your device is a Bring Your Own Device (BYOD) or is owned by your employer, the steps which you take should be similar. If you own the device, you may just initiate a device reset. Every device has the ability for a basic reset. In most cases, this will remove all the data and applications and place the device into an original setup state.

For example:

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required