Mobile Device Security
Mobile device security → protections applied to smartphones and tablets to safeguard data and systems, including screen locks, encryption, application control, mobile device management, and regular operating system updates.
Jailbreaking a Phone
Jailbreaking a phone → process on Apple iOS devices that removes manufacturer restrictions to install custom firmware or unauthorized apps, increasing flexibility but significantly reducing built-in security controls.
Rooting a Phone
Rooting a phone → process on Android devices that grants full administrative access to install custom firmware or modify system files, which increases risk by bypassing security protections.
Sideloading
Sideloading → installing applications from sources outside the official app store, increasing exposure to malicious or unverified software.
Vulnerabilities
Vulnerabilities → weaknesses in software, hardware, or configurations that attackers can exploit to compromise confidentiality, integrity, or availability.
Zero-day Attacks
Zero-day attacks → attacks that exploit previously unknown vulnerabilities before a patch or fix is available, making them particularly dangerous and difficult to defend against.
CVE
Common vulnerabilities and exposures (CVE) → publicly maintained system for identifying and cataloging known security vulnerabilities using standardized identifiers.