Chapter 5. Protecting Your Mobile Devices
As you have learned from previous chapters, there is a staggering variety of methods that hackers can use to access your smartphone device without your permission. In this chapter, we will discuss the steps you can take to reduce the likelihood that your device will be hacked. We will also discuss the steps you can take in the event that you become the victim of an attack. You will learn about the following:
What identification numbers are used to identify your smartphone
Jailbreaking and rooting
The importance of strong passwords
Device encryption and antivirus
How to manage a compromised device
How you can protect yourself and your device, including protecting