This document summarizes a presentation on smartphone security. The presentation covers smartphone security basics, common attack vectors, mitigation strategies, vulnerabilities in third-party apps, how to attack apps, and secure coding practices. Specific topics include what personal information is stored on smartphones, how 2G cellular networks have weak encryption of SMS messages that allows interception, and how the encryption on 2G networks can be broken.