Educating Users about Risks. What Data Is Being Transmitted? How Is Data Being Transmitted? How Physical Compromise Happens. Protecting a Stand-Alone BlackBerry. Spoofing and Intercepting Authentication. Understanding the BlackBerry Infrastructure. Attacking the BlackBerry Infrastructure. Controlling Data Is Critical. How Companies Lose Control of Data.
- Heat (87th Precinct).
- Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise.
- Ecohydrology of Water-Controlled Ecosystems: Soil Moisture and Plant Dynamics.
- Petit traité du bonheur 2.0 : Comment prendre soin de soi et des autres grâce aux technologies numériques (Hors collection) (French Edition).
- See a Problem?.
How to Control Data. Create and Communicate a Formal Policy. Enforce Security Policies with Available Technology. Stay Up-to-Date with Patches.
Use a Personal Firewall. Controlling Data Coming from a BlackBerry. Analyze the Data Coming from the BlackBerry.
Chapter 6 Exploiting PDAs. Backdoor Malware for the Pocket PC. Kaspersky Security for PDAs. Trend Micro Mobile Security. Symantec AntiVirus for Handhelds. Targeting a PDA Directly.
Making a PDA Stealthy. Compromising the PDA Physically. Controlling Access to the PDA. Learn Computer Programming the Right Way. Are you struggling to learn a programming language or don't know where to begin?
Check out my book and learn the proper way today! Understand each type of mobile device and the nature of the threat to each Recognize and implement a strong security strategy Identify specific threats to BlackBerry devices Learn from analysis of actual exploits Be able to anticipate future forms of attack See how hackers create and modify their assaults Defend against physical compromise and contamination from PC or LAN connectivity. Wiley; 1 edition April 30, Language: Related Video Shorts 0 Upload your video.
Share your thoughts with other customers. Write a customer review. There was a problem filtering reviews right now. Please try again later. Used this for a school research project. Worked great and gave solid information. Blackjacking takes on the task of educating both administrators and management about the threats of mobile devices to their enterprise.
I believe this book succeeds in its task and serves as a great reference not only for the blackberry enterprise server BES administrators out there but also for the network administrators, help desk personnel, security personnel as well as a book that can aid in the education of the end users. It is written in a tone and dialog that can be useful to the technical reader and non-technical reader and does well digging into the relatively new field of mobile device especially BlackBerry security.
The vignettes discussing plausible attacks for each attack scenario serve as good feasible examples to think about for your enterprise and users and how to protect your network. Discussion of how BlackBerry communications work with your cell phone provider and within a BlackBerry Enterprise Server environment, all the background material on the BlackBerry device, multiple examples for further research on what is best for your environment for AV and firewall solutions for each type of device, and seeing attacks on most of the threats in the lab using available tools.
Overall an excellent book. I purchased the book for my BlackBerry admin but I read it first and I think he will find it useful since he is not a "security" guy. It really ties together networking best practices and technologies and while not a "BlackBerry or mobile device or network lockdown guide" blackjacking serves as a good reference for further research into AV, firewalls, and VPNs for mobile devices as well as safe methods for allowing those devices entry and access into your network.
This book is a very interesting, quick and easy read. It not only talks about the issues of deploying a blackberry environment inside your organization, but also addresses smartphones, and other pda's. I would use this book as a great starting point, but also do your research before you start declaring the sky is falling for your organization. My reasoning for this is that I do not, currently, support any BlackBerry users.
There is a surprising amount of detail to be had on a subject that is not getting the light it needs, but I feel there could be a little more. Perhaps I am greedy in that respect, though.
I hope to see more like it. One person found this helpful. Open Preview See a Problem? Thanks for telling us about the problem. Return to Book Page. Preview — Blackjacking by Daniel V. These devices are the lifeline for companies large and small--and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a low priority.
Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise
Now, a certified ethical hacker explains in this book why this must change and how to change it. Packed with sobering examples of actual attacks, this unique resource shows you how to mount your counterattack. Paperback , pages. Published April 30th by Wiley first published January 1st To see what your friends thought of this book, please sign up. To ask other readers questions about Blackjacking , please sign up. Lists with This Book.