Mobile security

Potential mobile threats How to recognise a fake (malicious) mobile application Securing your mobile phone