tamhanna
What endangers mobile devices today? What can be done to mitigate threats? Why are mobile devices especially vulerable?