Overview

Smartphone Security Essentials Smartphone Attack Vectors
2 minutes
Share the link to this page
Copied
  Completed

In the second part of this course, you'll learn all about the 3 attack vectors

  1. Physical access, whether the smartphone is locked or not
  2. Close proximity, through wireless hacking
  3. and finally, remotely, through software and even the cloud

But before going through these 3 attack vectors, let's address the thing that some people ask and I'm sure many people think.

Why me? I'm nobody so what are the chances that I specifically would be hacked?

This is why it's important to realize that hackers launch two types of attacks. The first ones are opportunistic and they represent the majority of them.

Imagine hackers like fishermen who would launch millions of baits in the sea. If a fish happens to pass by and get lured into eating the bait, it gets caught. And because statistically speaking, there will always be a fraction of people who get caught, the payoff is always worth the effort.

In this scenario, they don't really care who gets caught and so you could be the victim. The second type of attack is targeted. Either they target a specific organization or one or more individuals. Since it requires patience and a lot of research, this kind of attack is occurring less often but the potential payoff might be bigger.

In the previous module, I mentioned money as the main motivation for attacking someone. Well, sometimes revenge is the reason for launching a targeted attack in order to disrupt operations or make someone's life miserable.

So now, let's see the different ways an attacker can try to compromise your smartphone.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.