Interesting article on mobile devices and their susceptibility to malicious attacks. While the article is geared toward the Department of Defense, the information provided is applicable to the commercial sector as well. What do you think?

Mobile Devices