Abstract
Mobile devices have become integral parts of our lives—particularly smartphones like Apple’s iPhone and all the variants of Android phones. Smartphones contain unbelievable amounts of extremely personal information including financial data, health data, your personal address book, e-mails, web surfing history, and access to much more data in the cloud. They also track your location pretty much anywhere on the planet, 24/7, because frankly they have to in order to send you texts and phone calls. If that weren’t enough, smartphones have built-in microphones and cameras that can record everything you do. Your mobile phone may have more personal information on it than any other device you own, even more than your home computer. And make no mistake—a smartphone is a computer, and a very powerful one at that. Do you remember the Deep Blue supercomputer that beat chess champion Garry Kasparov in 1997? The iPhone 8 (now almost 3 years old) has more than 20 times the computing power as Deep Blue, and it fits in your pocket! So, let’s talk about how we can secure these wonderful devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Actually, just about every security expert I’ve read or talked to believes the same thing.
- 2.
- 3.
Technically, Apple has renamed iOS for iPad as “iPadOS,” but for the purposes of this checklist, you can consider them to be the same.
- 4.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Carey Parker
About this chapter
Cite this chapter
Parker, C. (2020). Don’t Be a Smartphone Dummy. In: Firewalls Don't Stop Dragons. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6189-7_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-6189-7_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-6188-0
Online ISBN: 978-1-4842-6189-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books