In order to fully address the inherent threats of mobile devices, a wider view of the mobile ecosystem is necessary. This repository contains the Mobile Threat Catalogue, which describes, identifies, and structures the threats posed to mobile information systems. The background page provides context and a description of the origins of this repository.



Readers of the catalogue may notice threats that are not tied to a documented source or lack countermeasures, and other threats may exist that are not identified here. This catalogue is intended as a living document. Though the initial comment period is now closed, feedback on mobile threats addressed in the catalogue as well as ideas for additional threats are still encouraged.