Apart from utilizing computing power provided by mobile devices, the attackers are starting to target the
data. This is due to the fact that the smart-phones are becoming storage units for personal information through
use of various social networking applications, personal organizers and e-mail clients.