Leaving Your Device Vulnerable