作者: Ken Dunham
DOI:
关键词:
摘要: Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, other mobile devices. This first book growing threat covers a wide range of malware targeting operating systems like Symbian new devices iPhone. Examining code in past, current, future risks, protect your banking, auctioning, activities performed * Visual Payloads View as visible to end user, including notation variants. Timeline Mobile Hoaxes Threats Understand history major horizon for threates. Overview Families Identify understand groups malicious their variations. Taxonomy Malware Bring order known samples based infection, distribution, payload strategies. Phishing, SMishing, Vishing Attacks Detect mitigate phone-based phishing (vishing) SMS (SMishing) techniques. Operating System Device Vulnerabilities Analyze unique OS issues examine offensive device threats. Analyze Malware Design sandbox dynamic software analysis use MobileSandbox analyze malware. Forensic Analysis Malware Conduct forensic learn key differences forensics. Debugging Disassembling Malware Use IDA tools reverse-engineer analysis. Mitigation Measures Qualify risk, threats assets, defend against attacks, remediate incidents. * Understand History Threat Landscape Rapidly Emerging Attacks Device/Platform Vulnerabilities Exploits Mitigate Current Future Threats