In this IEEE article, author Charlie Miller talks about the mobile security vulnerabilities. He explains how smart phones are becoming targets of attackers and discusses security models of two smart phone operating systems: Apple's iOS and Google's Android. The attackers can get remote code to run on a mobile device in two ways: mobile malware and drive-by downloads.
Omnipresent synchronisation will be easy with CouchDB not only hosted as server side database but also being embedded in mobile applications. Couchbase made the NOSQL Document Database available for the mobile platforms to enable developers to benefit from the replication and offline capabilities while using the convenient and uniform HTTP based protocol to interact with it locally or remotely.