A comprehensive guide to the security issues involved in deployed iOS. From threat/risk analysis to iTunes configurations, this long (10K words/~40 min) read will walk you through the strengths and weaknesses of iOS.
This work was originally introduced to a very positive reception at B-Sides St. John's on 10-Jun-2011 as "iPads: Love'em, Hate'em, You're Going to Have to Deal With'em".
Whaling, spear phishing, and phishing are all variants on the same pattern of attack. At a high level, the target is sent correspondence---usually an email---and asked to take an action that seems legitimate but is in fact masking the transfer of information/money/etc.
This piece frames these attacks in easy to understand terms. Helping you recognize them and to not fail victim.