Mobile Computing Vulnerability