This document discusses security threats to smartphones from viruses and malware. It begins by explaining how smartphones are essentially pocket computers that can be infected similarly to computers, though through different transmission methods like Bluetooth, MMS, and internet downloads. It then provides examples of some of the first mobile viruses and worms, such as Cabir and ComWar, and how they spread. The document outlines various types of mobile threats including unwanted messaging or information theft. It concludes by offering some protective measures like locking down Bluetooth, password protecting SIM cards, and avoiding phishing attempts or giving out private information over calls or online.