“…Sophisticated attacks are used against mobile phones which are more vulnerable than PCS due to lack of counter attack measures. Moreover, mobile phones have become sophisticated and multiple utility devices to store emails, passwords, banking details, online transactions activities and storage of information and important data [8]. To individual Internet users, cybersecurity risks can result in threats to confidential identity, identity as well as privacy [9].…”