While the smartphone is moving into PC communications territory, it is moving away from PC security protocols. The main reason is location, or specifically, relocation.
In some ways, mobile phones are like laptops; they can go anywhere. However, laptops have security features. They have firewalls, encryption software, access points for wireless with security features like WEP. If you were to scale it from 1 to 10, with 1 being unsecured, and 10 highly secure, then PC’S are about a 7; laptops about a 5 and mobile phones about a 3.
Anyone determined to hack into a PC, laptop, or mobile phone can do so. That is an unfortunate fact of life. However, PC’s and laptops have many security features enabled to prevent unwanted access. Mobile phones, because they roam around, are going to be exposed from multiple locations.
Smartphone content is open to theft or loss. Some of the common elements of a network are access codes, user names and passwords, and they are often unsecured or set for automatic log-on. Other times, users who break into phones to customize features or carriers may leave themselves open to root password hacks. The very nature of mobile communication leaves the call exposed to random pickups. Once the call is in the air, it is vulnerable.