This document discusses the top 10 mobile risks. It outlines common mobile device use cases and the associated threats. These include risks from lost/stolen devices, compromised devices with malware, and devices being used to conduct malicious activities. The document also discusses mobile security models and the importance of hardware security for mobile devices to be considered trusted. It concludes by listing the top 10 mobile application risks according to Veracode and providing resources for further information.