Mobile computing devices have become a critical tool in today’s networked world. Enterprises and individuals alike, rely on mobile devices to remain reachable when they are away from the office or home. As our phones are becoming smarter by the day, threats through mobile phones also are becoming smart now-a-days.