Fr. 82.00

Mobile Malware Attacks and Defense

English · Paperback / Softback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Ken Dunham has more than a decade of experience on the front lines of information security. As Director of Global Response for iSIGHT Partners, he oversees all global cyber-threat response operations. He frequently briefs upper levels of federal and private-sector cyber security authorities on emerging threats, and regularly interfaces with vulnerability and geopolitical experts to assemble comprehensive malicious code intelligence and to inform the media of significant cyber threats. A major media company identified Mr. Dunham as the top quoted global malicious code expert in 2006. Mr. Dunham regularly discovers new malicious code, has written anti-virus software for Macintosh, and has written about malicious code for About.com, SecurityPortal, AtomicTangerine, Ubizen, iDEFENSE, and VeriSign. He is one of the pioneers of Internet community anti-virus support with websites rated as the best global resource by Yahoo Internet Life, PC WEEK, AOL and many others. Mr. Dunham is a member of the High Technology Crime Investigation Association (HTCIA), Government Emergency Telecommunications and Wireless Priority Service, AVIEN, Virus Bulletin, InfraGard, an RCG Information Security Think Tank, CME, and many other private information sharing channels. Mr. Dunham also participated in the CIA Silent Horizon (blue team) and DHS CyberStorm (observer) exercises. Mr. Dunham is a certified reverse engineer and regularly analyzes emergent exploits and malicious code threats and actors targeting client networks. He also works as a Wildlist Reporter each month with the Wildlist organization. He is the author of several books and is a regular columnist for an information security magazine. Mr. Dunham is also the founder of Boise Idaho Information Systems Security Association (ISSA) and Idaho InfraGard chapters. Klappentext Smile...You're on Webcam! A new more dangerous time for mobile device users! filled with mobile malware! is upon us. As with desktop computers! the world of PDAs and smartphones is no longer immune to malicious attack. The number of mobile malware attacks is on the rise! according to a study by the Informa Telecoms & Media that was sponsored by McAfee. Eighty-three percent of mobile operators surveyed have been hit by device infections. This is five times more than the number of incidents as recently as 2005. Nearly half of the mobile operators who have been the recipients of mobile malware experienced an attack within the last three months! according to the report. To date! nearly 400 mobile viruses have been detected. This is a staggering data point considering it has only been 3 years since the first instance of mobile malware was discovered in the wild. By comparison! it took TWENTY YEARS for traditional! wired malware to number 400. OK...SO! WHAT IS MOBILE MALWARE? Like malicious software (or "malware") in the wired world! mobile viruses are small programs that infect a host device. While most mobile phones are potential targets! smart phones and wireless PDAs as particularly attractive to fraudsters given their advanced capabilities to support PC-like applications including Web browsing and instant messaging. And! mobile malware can be downright...creepy. One particularly alarming mobile virus! according to Paul Miller! managing director of Symantec's mobile security group! is a form of snoopware that allows hackers to activate a microphone on a smartphone: Once that happens! anybody--from a stranger in the bedroom to a competitor in the boardroom--can listen in on a person's life at any time. Even more disturbing are mobile malware variants that can take over one's camera phone! So! for those of you who charge your cell phones on your night stand every night?smile! because you could be on candid Web camera. With more than 70 percent of mobile phone owners using their devices as an alarm clock. Our phones are always with us no...

List of contents

Acknowledgements
Chapter 1 Introduction to Mobile Malware
Chapter 2 Visual Payloads
Chapter 3 Timeline of Mobile Malware, Hoaxes, and Threats
Chapter 4 Overview of Mobile Malware Families
Chapter 5 Taxonomy of Mobile Malware
Chapter 6 Phishing, SMishing, and Vishing
Chapter 7 Operating System and Device Vulnerability
Chapter 8 Analyzing Mobile Malware
Chapter 9 Forensic Analysis of Mobile Malware
Chapter 10 Debugging and Disassembly of MMC
Chapter 11 Mobile Malware Mitigation Measures
Glossary of Terms
Index

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.