Today’s Mobile Security Threats: What Are They and How Can You Prevent Them?