This article discusses the risks and security challenges associated with wireless communication and mobile technology. It covers the advantages and disadvantages of using these technologies and provides recommendations and suggestions to improve security. The subject code, subject name, semester number, student name, and university name are not mentioned.