XI
Preface
Updated information, tutorials, a private forum, code, scripts and
tools, and author assistance are available on http://AndroidRisk.com
for rst-time owners of each copy of this book.
Everyone just starting in a technical eld, from the student in col-
lege to a seasoned security professional who wishes to add another
skill to his or her seasoned career, can benet from this actionable and
tactical book. Within minutes, the reader can start analyzing Android
malware. is is not a book on Android OS, fuzzy testing, or social
engineering; it is, however, on tearing apart Android malware threats.
You can quickly become the local expert with just a few tools and tips
outlined in this book. is book contains a voice of authority from
leading global experts in the eld who have already sized up the best
tools, tactics, and procedures for recognizing and analyzing Android
malware threats quickly and eectively.
Global growth and development of Android-based devices has
resulted in a wealth of assets on mobile solutions. In 2014, a person’s
phone may contain more information than a personal computer did
at the turn of the century, with sensitive contacts, banking informa-
tion, online searches and habits, personal voice and text data, recorded
geolocations at all times, a camera, voice monitoring and recording,
personal information, and more. Malware naturally follows areas of
opportunity for a variety of motives including eCrime, espionage, and