... Hacking and CountermeasuresVersion 6Module XXXVIHacking Mobile Phones, PDA and Handheld DevicesEthical Hacking and Countermeasures v6Module XXXVI: Hacking Mobile Phones, PDAs, and Handheld ... others. These are invisible to the user, loads on startup, and forwards SMS messages from the mobile to its author. Process: 1. Attacker sends an SMS to the target mobile. 2. The victim mobile ... spyware, opens the message, and installs the spyware onto the device.3. The spyware then takes the SMS messages consisting of some important information and forwards them to the attacker.Ethical...