Jump to ratings and reviews
Rate this book

Hacking Exposed Mobile

Rate this book
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

"Hacking Exposed Mobile" continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

Identify and evade key threats across the expanding mobile risk landscape. "Hacking Exposed Mobile: Security Secrets & Solutions" covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists

320 pages, ebook

First published January 1, 2013

8 people are currently reading
69 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
8 (22%)
4 stars
16 (45%)
3 stars
7 (20%)
2 stars
3 (8%)
1 star
1 (2%)
Displaying 1 - 4 of 4 reviews
1 review1 follower
January 11, 2019
Nyc
This entire review has been hidden because of spoilers.
Profile Image for BCS.
218 reviews33 followers
January 10, 2014
The rapid growth of mobile technology and increase in smartphone adoption has resulted in significant changes to the information security landscape over the past few years and this addition to the Hacking Exposed series attempts to cover the current knowledge gap in this new area.

The book has a broad coverage, starting with excellent chapters on the mobile risk ecosystem and potential attacks against the cellular network.

Later chapters cover mobile malware, mobile web applications and secure development for mobile devices. In addition there are more specific and more focussed chapters covering Android and iOS, but unfortunately no other platforms.

There is some excellent information provided and some interesting ground covered, although at 256 pages the book feels more like a high-level introduction. The chapters covering the mobile web, iOS and Android stand out from the others in this respect and provide the type of technical detail that would be useful for performing a security audit or assessment.

The absence of Windows and BlackBerry coverage is unfortunate from a security professional’s point of view. BlackBerry’s traditional use as the corporate device of choice and the increasing popularity of the Windows Phone 8 means that code and applications for the devices are frequently encountered during security assessments and some information on coding for these devices and testing against them would have been welcome and made the book feel more complete.

Overall the book stands up well as an introduction to the subject and the short chapters and accessible writing style mean that the reader can absorb most of the key information needed within a short space of time. The concentration on iOS and Android mean that it is not suitable for people working exclusively with Windows or BlackBerry platforms, and that supplemental books would be needed for anyone working across multiple platforms.

Reviewed by Nick Dunn, Senior Security Consultant NCC Group
9 reviews
August 11, 2014
This book is phenomenal. I haven't read any other technical book on the Android platform that discusses the smali bytecode language or the Dalvik VM in great detail. I now recommend it to iOS and Android students as a must-read if they're hoping to publish apps.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.