Edit This Page

Attacking Mobile Devices

Mobile devices have a broad attack surface that incident response analysts much understand at a high level to preperly respond and defend against attacks. This chapter will explore important concepts impacting mobile security and a detailed review of how mobile devices are compromised:

  • The SCAN Principle of Mobile Security
  • Anatomy of a Mobile Attack
  • Mobile Exploitation Process
  • Real-world Mobile Attacks
  • Who is Responsible