Module 7˸ Hacking Mobile Phones, PDAs, and Handheld Devices
In 2012, which smartphone operating system had more than 70% of the worldwide market?
Android Operating System
Which Trojan or virus targets Windows phones, Android phones, and even jail broken iPhones and is primarily directed to business and military leaders and diplomats?
Inception-Cloud Atlas
The term brick is used to refer to what?
It refers to a device that cannot function in any capacity.
What is the process called that unlocks iPhone and iPod devices to permit the installation of third-party applications?
Jailbreaking
Both Apple iOS and Android are actually custom-based versions of which operating system?
Linux Operating System
What type of malware can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call, and what photos and videos you shoot?
Spyware
Which jailbreaking tool allows users to break into an iPhone and install third-party Windows apps?
iDemocracy
What features of the iPod make it potentially useful for attackers?
rapid data transfer large storage capacity
When the BlackBerry smartphone was introduced, what was its most attractive feature?
security
Mobile spyware takes advantage of which smartphone application?
text messaging