Non-Fiction Books:

Hacking Mobile Phones

Sorry, this product is not currently available to order

Here are some other products you might consider...

Hacking Mobile Phones



Customer rating

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Share this product

Hacking Mobile Phones by Ankit Fadia
Sorry, this product is not currently available to order


Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving malicious phone calls? What if someone broke into your mobile phone and used it to transfer funds out of your bank account? Although mobile phones are valuable tools for exchanging photos with loved ones, getting the latest sports updates, buying and selling stocks, and even running entire businesses, they have also become more dangerous than you might ever imagine. Computer criminals can hack into mobile phones to intercept data; spread viruses, worms, and mobile Trojans; steal identities; and much more. How can you defend yourself against these attacks? Simple-educate yourself with "Hacking Mobile Phones," which The Hindu calls the "first book on the subject aimed at educating users against mobile phone-related security loopholes, vulnerabilities, and attacks." The New Indian Express declares Fadia's book "an excellent guide for all mobile phone users." Deriving data from actual research experiments, code analysis, and case and consumer studies, this book will open your eyes to security threats, secrets, and loopholes that until now went unnoticed.

Table of Contents

PART I: Security Threats 1. Bluetooth Hacking 2. Mobile DoS Attacks 3. Email Attacks 4. Viruses, Worms, and Trojans PART II: Security Tips and Tricks 5. Nokia Security 6. Motorola Security 7. Samsung Security 8. Sony Ericsson Security 9. Siemens Security 10. BlackBerry Security PART III: Appendices A. Security Test: Comparing Various Handsets B. GSM Versus CDMA C. iMode D. Online Resources E. Mobile Phone Platforms F. Bluetooth-Enabled Mobile Phones G. Infrared-Enabled Mobile Phones H. GPRS-Enabled Mobile Phones
Release date Australia
January 6th, 2006
Country of Publication
United States
Course Technology Inc
Product ID

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

  • If you think we've made a mistake or omitted details, please send us your feedback. Send Feedback
  • If you have a question or problem with this product, visit our Help section. Get Help
Filed under...