How to hack a phone: 7 common attack methods explained

From csoonline.com

mobile security / threat detection / traffic analysis

The smartphone revolution was supposed to provide a second chance for the tech industry to roll out a secure computing platform. These new devices were purported to be locked down and immune to malware, unlike buggy PCs and vulnerable servers.

But it turns out that phones are still computers and their users are still people, and computers and people will always be weak links. We spoke to a number of security experts to help you get a sense of the most common ways attackers might go about breaking into the powerful computers in your users’ pockets. This should hopefully give you perspective on potential vulnerabilities.

Read more…