El malware ha dado el salto a la movilidad y el panorama de la seguridad está cambiando rápidamente con ataques emergentes a teléfonos inteligentes, PDAs y otros dispositivos móviles. Este libro trata esta amenaza y cubre una amplia gama de malware dirigido a sistemas operativos como Symbian y a nuevos dispositivos como el iPhone.
Aprende a analizar vulnerabilidades y exploits de plataformas y dispositivos móviles y a mitigar estas amenazas para proteger tus datos bancarios, subastas y otras actividades realizadas en tu smartphone.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats
Compra - Amazon.es
Aprende a analizar vulnerabilidades y exploits de plataformas y dispositivos móviles y a mitigar estas amenazas para proteger tus datos bancarios, subastas y otras actividades realizadas en tu smartphone.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats
Compra - Amazon.es
Yo estoy tras un libro que muestre hacking a móviles en una perspectiva educativa, casos prácticos. ÉSte puede responder a eso? Alguien lo ha leído?
ResponderEliminarEcha un vistazo al libro, lo puedes encontrar en Google http://books.google.es/books?id=Nd1RcGWMKnEC&pg=PR4&lpg=PR4&dq=syngress+Mobile+Malware+Attacks+and+Defense#v=onepage&q=syngress%20Mobile%20Malware%20Attacks%20and%20Defense&f=false
ResponderEliminar