Blackjacking: Security Threats to Blackberry, PDA's, and by Daniel V. Hoffman

By Daniel V. Hoffman

This present day, it truly is virtually most unlikely to do company with no mobile phone and a BlackBerry or PDA. those units are the lifeline for corporations huge and small-and no one is aware this higher than a hacker. normally, defense for cellular units has held a low precedence. Now, a qualified moral hacker explains during this ebook why this needs to swap and the way to alter it. choked with sobering examples of tangible assaults, this particular source exhibits you ways to mount your counterattack.

Show description

Read or Download Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise PDF

Best comptia books

Privacy Protection and Computer Forensics(Artech House Computer Security Series)

This revised variation of an Artech residence bestseller is going a ways past the common desktop forensics books out there, emphasizing tips on how to safeguard one's privateness from info robbery and opposed desktop forensics. the second one version has been up-to-date to provide extra distinct how-to advice on holding the confidentiality of information kept on desktops, and particular details at the vulnerabilities of common ancillary computing units, akin to PDAs, mobile phones, clever playing cards, GPS units, phone calling playing cards, fax machines, and photocopiers.

Security in RFID and Sensor Networks

Some time past a number of years, there was an expanding pattern within the use of Radio Frequency identity (RFID) and instant Sensor Networks (WSNs) in addition to within the integration of either platforms because of their complementary nature, versatile mix, and the call for for ubiquitous computing. As regularly, sufficient safeguard continues to be one of many open components of outrage ahead of huge deployment of RFID and WSNs could be completed.

Foundations of Security Analysis and Design II

Defense is a speedily turning out to be sector of laptop technology, with direct and lengthening relevance to real-life purposes, similar to net transactions, e-commerce, details safeguard, community and platforms safeguard, and so on. Foundations for the research and layout of security measures of such purposes are badly wanted for you to validate and turn out their correctness.

Network Security Policies and Procedures (Advances in Information Security)

Corporation community directors are forced this day to aggressively pursue a strong community safeguard regime. This booklet goals to offer the reader a powerful, multi-disciplinary knowing of the way to pursue this target. This expert quantity introduces the technical matters surrounding safety in addition to how protection guidelines are formulated on the government point and communicated in the course of the association.

Extra resources for Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise

Sample text

If a hacker can determine the IP address of the device and can access that IP address, the device can be attacked from anywhere in the world. A mobile user could be connected to the Internet with their EvDO (Evolution Data Optimized) card while traveling in a taxi in New York, and a hacker sitting on the beach in LA can scan a range of IP addresses and happen to find their device. That’s one of the very good and very bad things about the Internet. It enables different devices to be interconnected all around the world, though not everyone connected is acting ethically.

Messenger session. Internet Mobile device connected to public Wi-Fi hotspot Wi-Fi hotspot access point Actual Yahoo! 5: Sniffing data in a public Wi-Fi hotspot Another consideration is that new mobile devices are coming with Bluetooth technology. This can be particularly helpful when using wireless headsets for phone conversations and for synching Bluetooth-enabled devices with other Bluetooth-enabled devices. As with Wi-Fi technology, this information is flying through the air and can be sniffed.

They essentially built a fortress between the LAN and the Internet, and they did so for good reason. With the present change in how workers work and the technology that they use today, this old way of thinking simply doesn’t apply to mobility. Certainly, the LAN still needs to be protected and that will not be denied. However, these LAN-based systems cannot be relied upon to protect mobile devices. This means that two fundamental shifts needs to take place: ■■ Enterprises need to change their strategies from protecting only their LAN to putting policies and systems in place to protect the mobile devices.

Download PDF sample

Rated 4.00 of 5 – based on 43 votes