1.5 Mobile Security and Common Vulnerabilities