5 Considerations for a Successful BYOD Strategy
Tips and Tricks on Securing your Android Devices
Kindsight security labs malware report - Q4 2013
D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion,