Protecting information in mobile devices. Hacking mobile devices by hackers. Data protection in the cloud.