Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving malicious phone calls? What if someone broke into your mobile phone and used it to transfer funds out of your bank account? Although mobile phones are valuable tools for exchanging photos with loved ones, getting the latest sports updates, buying and selling stocks, and even running entire businesses, they have also become more dangerous than you might ever imagine. Computer criminals can hack into mobile phones to intercept data; spread viruses, worms, and mobile Trojans; steal identities; and much more. How can you defend yourself against these attacks? Simple-educate yourself with "Hacking Mobile Phones," which The Hindu calls the "first book on the subject aimed at educating users against mobile phone-related security loopholes, vulnerabilities, and attacks." The New Indian Express declares Fadia's book "an excellent guide for all mobile phone users."
Deriving data from actual research experiments, code analysis, and case and consumer studies, this book will open your eyes to security threats, secrets, and loopholes that until now went unnoticed.
Table of Contents
PART I: Security Threats 1. Bluetooth Hacking 2. Mobile DoS Attacks 3. Email Attacks 4. Viruses, Worms, and Trojans PART II: Security Tips and Tricks 5. Nokia Security 6. Motorola Security 7. Samsung Security 8. Sony Ericsson Security 9. Siemens Security 10. BlackBerry Security PART III: Appendices A. Security Test: Comparing Various Handsets B. GSM Versus CDMA C. iMode D. Online Resources E. Mobile Phone Platforms F. Bluetooth-Enabled Mobile Phones G. Infrared-Enabled Mobile Phones H. GPRS-Enabled Mobile Phones