In our previous blog post, we wrote about what’s planned for 2014. Since we’re aiming to change the world of mobile security, maybe a good place to start is to describe the security limitations on smart devices. Like a computer, right? Often, people think that mobile device security is exactly […]