diff -r 80ef3a206772 -r 48780e181b38 Symbian3/SDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita --- a/Symbian3/SDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita Fri Jul 16 17:23:46 2010 +0100 +++ b/Symbian3/SDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita Tue Jul 20 12:00:49 2010 +0100 @@ -15,7 +15,7 @@ their greatest threat, and allows intruders to try different attack methods against the device. The figure below illustrates the most common methods of attack against mobile devices.

-Mobile device and common attack methods +Mobile device and common attack methods

Due to the nature of mobile devices, including the potential vulnerabilities mentioned above, you should consider the following points when designing your application: