--- a/Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita Tue Jul 20 12:00:49 2010 +0100
+++ b/Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita Fri Aug 13 16:47:46 2010 +0100
@@ -15,7 +15,7 @@
their greatest threat, and allows intruders to try different attack methods
against the device. The figure below illustrates the most common methods of
attack against mobile devices.</p>
-<fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e13560_href.png"/></fig>
+<fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e13674_href.png"/></fig>
<p>Due to the nature of mobile devices, including the potential vulnerabilities
mentioned above, you should consider the following points when designing your
application:</p>