0
A guide on protecting against mobile threats. Examples of large-scale attacks on mobile devices are given, vulnerabilities of mobile platforms are described. With the participation of a real hacker, we developed step-by-step instructions on how to protect against mobile threats.