176 KB | 3 files | DOC, PDF
Smartphones’ popularity and relatively lax security have made them attractive targets for attackers.
Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published early last year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones. One example is this last year’s Valentine’s Day attack, in which attackers distributed a mobile picture-sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent. The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up.
Included in this ZIP file are:
This excerpt from chapter four focuses on using PhoneGap Build, including beginning steps, creating builds for different mobile platforms, loading private keys, and installing builds on the emulator. ... More >>
This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use and provides recommendations for securing mobile devices throughout their life cycles. ... More >>
This paper from the National Institute of Standards and Technology discusses the key issues surrounding smartphone security. It’s a great starting point if you’re trying to emphasize the importance of proper security in the age of BYOD. ... More >>