Mobile Security: Potential Threats and Solutions - Part 4