This document provides an overview of mobile application security. It begins with an introduction to the topic and why mobile security matters given the increasing ubiquity of mobile devices. It then covers common mobile vulnerabilities like those in the OWASP Mobile Top 10 list and examples like logic flaws, poor network security, insecure data storage, and privacy violations. The document concludes with recommendations on adopting an attacker mindset, leveraging resources, and thanks to sponsors.