Mobile Attack Vectors
Mobile Platform Vulnerabilities and Risks
Android OS Architecture
Android Vulnerabilities
Android Trojans
Securing Android Devices
Jailbreaking iOS
Guidelines fot securing iOS Devices
Windows Phone 8 Architecture
Guidelines for Securing Windows OS Devices
BlackBerry Attack Vectors
Guidelines for Securing BackBerry Devices
Mobile Device Managment (MDM)
General Guidelines for Mobile Platform Security
Mobile Protection Tolls
Mobile Pen Testing