Chapter 11
Mobile Devices
IN THIS CHAPTER
Seeking out the common weaknesses in laptops, phones, and tablets
Executing security tests to uncover crucial mobile flaws
Exploring the security vulnerabilities associated with the Internet of Things (IoT)
Minimizing mobile security risks
Mobile computing is popular for business and for hacking. It seems that everyone has a mobile device of some sort for personal or business use (usually both). If not properly secured, mobile devices connected to the enterprise network represent thousands upon thousands of unprotected islands of information floating about, out of your control.
Because of all the phones, tablets, and laptops running numerous operating system (OS) platforms chock-full of apps, an infinite number of risks is associated with mobile computing. Rather than delving into all the variables, this...