Nowadays, mobile phones are used as multipurpose devices that fit in the palm of the hand having the capability to take photos or sending emails. However, with the advent of mobile technologies, attackers are developing new techniques to bypass security mechanisms and breach into the security systems of mobile phones. In this report, a brief introduction to mobile viruses along with security principles to sustain the confidentiality, availability, and integrity of the data has been discussed. Previous research that proposed novel techniques of mobile security have been discussed. Moreover, layered and cross-platform approaches are discussed to understand Android architecture. Current statistics of attacks on mobile devices and points of fut...