1. Trevor Mogg Digital Trends, Smartphone sales exceed those of PCs for first time, Apple smashes record (February 2012), [cited April 2014]. Available from: http://www.digitaltrends.com/mobile/smartphone-sales-exceed-those-of-pcs-for-first-time-apple-smashes-record/.
2. Gartner Press Release, Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments On Pace to Grow 7.6 Percent in 2014 (January 2014), [cited April 2014]. Available from: http://www.gartner.com/newsroom/id/2645115.
3. McAfee, Mobile Malware Predicted to Trump All 2014 Malware Attacks (January 2014), [cited April 2014]. Available from: http://www.mcafee.com/uk/security-awareness/articles/mobile-malware-predicted-to-top-all-2014-malware-attacks.aspx.
4. McAfee, McAfee reveals consumers fail to protect their mobile devices (February 2013), [cited May 2014]. Available from: http://www.mcafee.com/us/about/news/2013/q1/20130224-01.aspx.
5. Dan Worth, V3.co.uk, More than 15,000 lost mobile phones on London underground pose security risk (December 2013), [cited May 2014]. Available from: http://www.v3.co.uk/v3-uk/news/2318727/more-than-15-000-lost-mobile-phones-on-london-underground-pose-security-risks.
6. Scott Wright, Symantec, Symantec Smartphone Honeystick Project [cited May 2014]. Available from: http://www.symantec.com/content/en/us/about/presskits/b-symantec-smartphone-honey-stick-project.en-us.pdf.
7. McAfee, McAfee Labs Threat Report June 2014 (June 2014), [cited July 2014]. Available from: http://www.mcafee.com/sg/resources/reports/rp-quarterly-threat-q1-2014.pdf.
8. McAfee Labs, McAfee Labs 2014 Threat Predictions (January 2014), [cited May 2014] Available from: http://www.mcafee.com/us/resources/reports/rp-threats-predictions-2014.pdf.
9. Kaspersky.com, Teamwork: How the Zitmo Trojan bypasses online banking security (October 2011), [May 2014]. Available from: http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security.
10. Ian Barker, BetaNews, Say cheese – new Android malware can hijack your camera(March 2014), [cited May 2014]. Available from: http://betanews.com/2014/03/07/say-cheese-new-android-malware-can-hijack-your-camera/.
11. Infosecurity.com, Most users have not installed security software on their smartphones survey finds (January 2012), [cited May 2014]. Available from: http://www.infosecurity-magazine.com/view/23002/most-users-have-not-installed-security-software-on-their-smartphones-survey-finds/.
12. Zoe Fox. Mashable, The Average Smartphone User Downloads 25 Apps (September 2013), [cited May 2014]. Available from: http://mashable.com/2013/09/05/most-apps-download-countries/.
13. John Leydon. theRegister, The truth about LEAKY, STALKING, SPYING smartphone applications (January 2014), [cited May 2014]. Available from: http://www.theregister.co.uk/2014/01/31/smartphone_app_spy_risks/.
14. McAfee Labs, Q1 2014 Quarterly Threats report (June 2014), [cited July 2014]. Available from: http://www.mcafee.com/uk/resources/reports/rp-quarterly-threat-q1-2014.pdf
15. Brian Prince, Open source vulnerabilities plague large organisations (March 2012), [cited May 2014]. Available from: http://www.securityweek.com/open-source-security-vulnerabilities-plague-large-organizations.
16. Brian Donohue, Threatpost, RSA Conference Mobile Application Marred by Security Vulnerabilities (February 2014), [cited May 2014]. Available from: http://threatpost.com/rsa-conference-mobile-application-marred-by-security-vulnerabilities/104547.
17. Zach Epstein, BGR, Major holes found in 90% of top mobile banking apps (January 2014), [cited May 2014]. Available from: http://bgr.com/2014/01/14/mobile-banking-apps-security-vulnerabilities/.
18. William Jackson, GCN Cybersecurity, iPhone has the most vulnerabilities so why is Android the most hacked (April 2013), [cited May 2014]. Available from: http://gcn.com/articles/2013/04/19/iphone-vulnerabilities-android-most-attacked.aspx.
19. Trend Micro, Emerging Vulnerabilities: Glitches go mobile [cited May 2014]. Available from: http://about-threats.trendmicro.com/RelatedThreats.aspx?language=au&name=Emerging+Vulnerabilities%3A+Glitches+Go+Mobile.
20. Dan Simmons, BBC News, Free Wi-fi hotspots pose data risks, Europol Warns (March 2014), [cited May 2014]. Available from: http://www.bbc.co.uk/news/technology-26469598.
21. Simon Hill, Digital Trends, Tired of Google Play? Check out these alternative Android app stores (December 2013), [cited May 2014]. Available from: http://www.digitaltrends.com/mobile/android-app-stores/.
22. Devika Girish, Mobstac, Boost your Android App Installs with Third-party App stores (December 2013), [cited May 2014]. Available from: http://blog.mobstac.com/2013/12/boost-your-android-app-installs-with-third-party-app-stores/.
23. F-Secure, H2 2013 Threat Report [cited May 2014]. Available from: http://www.f-secure.com/static/doc/labs_global/Research/Threat_Report_H2_2013.pdf.
24. Matt Asay, ReadWrite.com, Why your iPhone will invariably catch a virus (September 2013), [cited May 2014]. Available from: http://readwrite.com/2013/09/05/kaspersky-the-ios-malware-dam-will-break.
25. Tom Worstall, Forbes.com, Apple Explains Why IOS Don’t Need No Steenkin Anti-virus (April 2012), [cited May 2014]. Available from: http://www.forbes.com/sites/timworstall/2012/06/04/apple-explains-why-ios-dont-need-no-steenkin-anti-virus/.
26. Lorenzo Franceschi-Bicchierai, Mashable, Hackers Expose Security Holes that Allow ‘free Rides for Life’ (August 2013), [May 2014]. Available from: http://mashable.com/2013/08/05/mifare-ultralights-hack-def-con/.
27. Eric Limer, Gizmodo.com, UltraReset Is an NFC-hacking App That Hands Out Free Train Rides (September 2012), [May 2014]. Available from: http://gizmodo.com/5945669/some-nfc-hackers-managed-to-develop-a-free-train-ride-app.
28. Ryan Naraine, ZDNet, Exploit beamed via NFC to hack Samsung Galaxy S3 (Android 4.0.4) (September 2012), [cited May 2014]. Available from: http://www.zdnet.com/exploit-beamed-via-nfc-to-hack-samsung-galaxy-s3-android-4-0-4-7000004510/.
29. Mobile Working Group, Cloud Security Alliance, Security Guidance for Critical Areas of mobile computing (November 2012), [cited May 2014]. Available from: https://downloads.cloudsecurityalliance.org/initiatives/mobile/Mobile_Guidance_v1.pdf.