The risks created by portable, always-on smartphones, tablets and other mobile computing devices are extending the attack surfaces that require protection for both consumers and enterprises. ??? People connect to unsecured wireless hotspots and download apps with impunity, giving little thought as to whether the app provider is trustworthy.