
- 440 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Mobile Malware Attacks and Defense
About this book
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.* Visual PayloadsView attacks as visible to the end user, including notation of variants.* Timeline of Mobile Hoaxes and ThreatsUnderstand the history of major attacks and horizon for emerging threates.* Overview of Mobile Malware FamiliesIdentify and understand groups of mobile malicious code and their variations.* Taxonomy of Mobile MalwareBring order to known samples based on infection, distribution, and payload strategies.* Phishing, SMishing, and Vishing AttacksDetect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.* Operating System and Device VulnerabilitiesAnalyze unique OS security issues and examine offensive mobile device threats.* Analyze Mobile MalwareDesign a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.* Forensic Analysis of Mobile MalwareConduct forensic analysis of mobile devices and learn key differences in mobile forensics.* Debugging and Disassembling Mobile MalwareUse IDA and other tools to reverse-engineer samples of malicious code for analysis.* Mobile Malware Mitigation MeasuresQualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.- Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks- Analyze Mobile Device/Platform Vulnerabilities and Exploits- Mitigate Current and Future Mobile Malware Threats
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1. Solutions in this chapter:
- Understanding Why Mobile Malware Matters Today
- An Introduction to MM Threats
- An Introduction to Mobile Security Terminology
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Introduction
This book's contents do include discussions of exploits and attacks. Handle all data with caution and use ethical and legal guidelines to respond to the media in the book. We've done our best to sanitize all weaponized data and cripple any code that script kiddies might want to abuse for illegal or unethical actions.
Understanding Why Mobile Malware Matters Today
Security works best when it is promoted from the CEO down to the security staff. Leverage case studies and anecdotal data clearly communicate the components of risk to executives to build buy-in with mission-critical staff. By regularly communicating internal risks, activities, and external risks, executives are best able to make informed decisions, placing a value upon computer security. This is especially true as it relates to brand name and consumer confidence, where executives don't want to see their name or the company name in the press due to a security incident.
Notes from the UndergroundâŚ
Cabir Source Code
The source code for Cabir was spread privately for several months prior to the January 1, 2005 distribution by 29A. Distribution of source code greatly increases the likelihood of modifications and new codes related to the original distribution. If source code for a new threat emerges or is sold or developed through hacker-for-hire relations, the risk of attack increases significantly.
Table of contents
- Brief Table of Contents
- Table of Contents
- Copyright
- Technical Editor
- Contributing Authors
- Acknowledgments/Contributors
- Chapter 1. Introduction to Mobile MalwareSolutions in this chapter:
- Chapter 2. Visual PayloadsSolutions in this chapter:
- Chapter 3. Timeline of Mobile Malware, Hoaxes, and ThreatsSolutions in this chapter:
- Chapter 4. Overview of Mobile Malware FamiliesSolutions in this chapter:
- Chapter 5. Taxonomy of Mobile MalwareSolutions in this chapter:
- Chapter 6. Phishing, SMishing, and VishingSolutions in this chapter
- Chapter 7. Operating System and Device VulnerabilitiesSolutions in this chapter:
- Chapter 8. Analyzing Mobile MalwareSolutions in this chapter:
- Chapter 9. Forensic Analysis of Mobile MalwareSolutions in this chapter:
- Chapter 10. Debugging and Disassembly of MMCSolutions in this chapter:
- Chapter 11. Mobile Malware Mitigation MeasuresSolutions in this chapter:
- Glossary
- Glossary: Glossary of TermsNumbered TermsABCDEFGHIJKLMNOPRSTVWX
- Index