Sizing Up Mobile Vulnerabilities
It pays to find and fix the low-hanging fruit on your network. That’s where you get the most bang for your buck. The following mobile laptop, phone, and tablet weaknesses should be front and center on your priority list:
- No encryption
- Poorly implemented encryption
- No power-on passwords
- Easily guessed (or cracked) power-on passwords
For other technologies and systems (web applications, operating systems, and so on), you can usually find just the testing tool you need. However, for finding mobile-related flaws, relatively few security testing tools are available. Not surprisingly, the more expensive tools often enable you to uncover the big flaws with the least amount of pain and hassle.