Most malware uses the DNS to communicate and our technology processes about 30% of the worlds' DNS traffic, so we were able to identify the top five mobile-only malware threats.
MORE FINDINGS:
We defined greatest threat as the most widespread malware that meets a baseline level of risk to the end user -- for example, malware that attempts to steal a person's identity and/or money. What follows is a summary of the current mobile malware landscape and a short description of each malware threat, along with some thoughts on what can be done to protect end users.
The mobile malware threat is real with a significant number of infections in existence today that are capable of , and this number is growing everyday. Our research shows that of malware writers.