• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

4. Protect Your Phone > Hacks 22–25: Introduction

Hacks 22–25: Introduction

In the mobile information age, mobile phones not only store sensitive information about us, but also act as an identity provider for us when we use mobile network services. Therefore, it is important that we keep our phones physically secure.

It is also important that we keep our phones secure from viruses and other forms of attack. As mobile phones and related services become increasingly sophisticated, many potential security problems can arise because phones are networked in so many ways. In this chapter, you will learn how to secure your device against malicious programs, service theft, and data theft.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint