The report discusses the ethical implications of 5 active mobile threats that are spoofing enterprise apps. It applies four classical ethical theories, including utilitarianism, deontology, virtue ethics, and contract theory, to analyze the case study. The report concludes that such ethical issues related to data security should be eradicated on time.