Mobile Security: Potential Threats and Solutions - Part 1