Libro: Mobile Malware Attacks and Defense

El malware ha dado el salto a la movilidad y el panorama de la seguridad está cambiando rápidamente con ataques emergentes a teléfonos inteligentes, PDAs y otros dispositivos móviles. Este libro trata esta amenaza y cubre una amplia gama de malware dirigido a sistemas operativos como Symbian y a nuevos dispositivos como el iPhone.
Aprende a analizar vulnerabilidades y exploits de plataformas y dispositivos móviles y a mitigar estas amenazas para proteger tus datos bancarios, subastas y otras actividades realizadas en tu smartphone.

* Visual Payloads
View attacks as visible to the end user, including notation of variants.

* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.

* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.

* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.


* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.

* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.

* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.

* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.

* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.

* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.

* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks

* Analyze Mobile Device/Platform Vulnerabilities and Exploits

* Mitigate Current and Future Mobile Malware Threats


Compra - Amazon.es

Comentarios

  1. Yo estoy tras un libro que muestre hacking a móviles en una perspectiva educativa, casos prácticos. ÉSte puede responder a eso? Alguien lo ha leído?

    ResponderEliminar
  2. Echa un vistazo al libro, lo puedes encontrar en Google http://books.google.es/books?id=Nd1RcGWMKnEC&pg=PR4&lpg=PR4&dq=syngress+Mobile+Malware+Attacks+and+Defense#v=onepage&q=syngress%20Mobile%20Malware%20Attacks%20and%20Defense&f=false

    ResponderEliminar

Publicar un comentario