Source: https://www.nowsecure.com Because of the extensive usage and implementation of bring your own device (BYOD) policies in organizations, mobile devices have emerged as a prime target for attacks. Attackers scan these devices for vulnerabilities. Such attacks can involve the device and the network layer, the data center, or a combination of them. Attackers exploit vulnerabilities associated with the following to launch malicious attacks: Figure 9.2: Anatomy of a mobile attack The Device Vulnerabilities in mobile devices pose significant risks to sensitive personal and corporate data. Attackers targeting the device itself can use various entry points. Device-based attacks are of the following types: Browser-based Attacks Browser-based methods of attack are as follows: Phishing : Phishing emails or pop-ups redirect users to fake web pages that mimic trustworthy sites, asking them to submit their personal information such ...
I am Darian Ross. Welcome to my blogger site.