Summary
In this chapter, we discussed:
Personal and device identification numbers
Preventative measures to discourage hackers
How to create strong passwords
The disadvantages of reusing passwords
Data encryption on smartphones
How to research apps
Signs that a device has been hacked
SMS messaging attacks
Trojans in applications and attachments
What to do if an account has been compromised
How to wipe a smartphone
In the next chapter we will see how to get your device serviced in the event of a significant malfunction.