Today we live in a transitional period from desktop computing to ubiquitous computing. Modern mobile devices, such as smartphones and tablet pc’s, offer the capability of any time - any place computing. Mobile devices and applications have acquired critical importance both in our personal and professional lives. More than enough processing power, readable screen, powerful camera, Wi-Fi, 4G are some of the characteristics of a mobile device that allow users to do almost anything. The rapid spread of mobile devices has created a plethora of attacks by malicious users who aim at personal gain, deceive users, and steal or destroy their personal data. The hacker either attacks via the Internet or via malware application trying to intrude into the privacy of the users. The android is an operating system targeting at mobile devices and has a great impact on the market; it is in fact a leader in consumer preferences. But despite the security mechanisms available, it is increasingly becoming a large target for hackers worldwide. An understanding of how the hacking on mobile devices is made and the awareness from users of the risks they are exposed to, can lead to a better protection of the valuable data as well as a more effective way to deal with threats.