Blackjacking security threats to Blackberry devices, PDAs, and cell phones in the enterprise

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small-and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a low priority. Now, a certified ethical hacker exp...

Descripción completa

Detalles Bibliográficos
Autor principal: Hoffman, Daniel 1972- (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley Pub c2007.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626975406719
Tabla de Contenidos:
  • Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise; About the Author; Credits; Acknowledgments; Contents; What Is Blackjacking?; When Is a Computer Not a Computer?; The Flow of This Book; Part I: Understanding the Threats and Devices; Chapter 1: Understanding the Threats; Quantifying the Threat; Mobile Device Enterprise Infrastructure; PC and LAN Connectivity; Fundamental Changes in Security Strategy; Things to Remember; Chapter 2: Understanding the Devices; BlackBerrys; Pocket PCs; Palm Handhelds; Cell Phones; Things to Remember
  • Part II: How BlackBerrys Are Hacked, and How to Protect ThemChapter 3: Exploiting BlackBerry Devices; Malware Is Threatening Your BlackBerry; Attacking a BlackBerry Directly; Intercepting BlackBerry Communication; Physically Compromising a BlackBerry by Spoofing and Intercepting Authentication; BlackBerry Security Checklist; Things to Remember; Chapter 4: Hacking the Supporting BlackBerry Infrastructure; Good and Bad: A Conduit to Your LAN; Understanding the BlackBerry Infrastructure; Attacking the BlackBerry Infrastructure; Things to Remember
  • Chapter 5: Protecting Your PC and LAN from BlackBerrysControlling Data Is Critical; Threats from BlackBerry-Provided Internet Access; Controlling Data Coming from a BlackBerry; Things to Remember; Part III: How PDAs Are Hacked, and How to Protect Them; Chapter 6: Exploiting PDAs; Corrupting Your PDA with Malware; Targeting a PDA Directly; Intercepting PDA Communication; PDA Authentication Spoofing and Interception; Compromising the PDA Physically; Things to Remember; Chapter 7: Hacking the Supporting PDA Infrastructure; Connecting a PDA to the LAN Is Good and Bad
  • Using PDA VPN Clients to Protect the InfrastructureThings to Remember; Chapter 8: Protecting Your PC and LAN from PDAs; Connecting PDAs to Enterprise Resources; PDAs May Be Contagious; Preventing PDAs from Bringing Malware into the Enterprise; Things to Remember; Part IV: How Cell Phones Are Hacked, and How to Protect Them; Chapter 9: Exploiting Cell Phones; Cell-Phone Malware; Stealing Data via Bluetooth; Intercepting Cell-Phone Communication; Physical Compromise and Cell-Phone Authentication Spoofing; Things to Remember; Chapter 10: Protecting the Enterprise PC and LAN from Cell Phones
  • Cell Phones May Bring in MalwareExposing Enterprise Email; Exporting Enterprise Data and Clandestine Data Gathering; Things to Remember; Index; Appendix A: References