Loading: 8 Tips for More Secure Mobile Computing