This document discusses mobile security and provides an overview of attacks and defenses. It begins with an introduction to common mobile security issues like weak storage of sensitive data. Examples are given covering threats to mobile e-commerce, banking, and social applications. The document also outlines the mobile threat landscape, including attacks that don't require jailbreaking, and privacy risks. It concludes with a discussion of technology trends in mobile architectures and the complexity of securing the mobile environment.