The myths and realities of mobile device security