Mobile devices are replacing desktops and laptops as they become more and more advanced. They enable users to access email, browse the Internet, navigate via GPS, store critical data including contact lists, passwords, calendars, login credentials and so on. Also, the latest developments in mobile commerce have enabled users to perform transactions such as purchasing goods and applications over wireless networks, redeeming coupons and tickets, banking, and more from their smartphones.
So Investigating mobile security is seriously a necessary thing for us to pay attention.