Abstract
The rise in the use of mobile devices and smartphones has also increased the risk of compromise of sensitive personal data present on these devices. This chapter introduces the two most popular mobile platforms, Android and iOS, along with their security implications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Sagar Ajay Rahalkar
About this chapter
Cite this chapter
Rahalkar, S.A. (2016). Hacking Mobile Platforms. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_12
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2325-3_12
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2324-6
Online ISBN: 978-1-4842-2325-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books