diff -r 48780e181b38 -r 578be2adaf3e Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita --- a/Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita Tue Jul 20 12:00:49 2010 +0100 +++ b/Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita Fri Aug 13 16:47:46 2010 +0100 @@ -15,7 +15,7 @@ their greatest threat, and allows intruders to try different attack methods against the device. The figure below illustrates the most common methods of attack against mobile devices.

-Mobile device and common attack methods +Mobile device and common attack methods

Due to the nature of mobile devices, including the potential vulnerabilities mentioned above, you should consider the following points when designing your application: