This document discusses threats to mobile devices and provides countermeasures. It outlines three prime targets for attackers: data, identity, and availability. Attacks can allow manipulation of the device, recording of conversations, and theft of personal or professional data. Countermeasures include security software, biometric identification, monitoring battery and memory usage, and increasing user awareness. The document emphasizes that users play a key role in mobile security through careful management of permissions and passwords.