Juniper Networks


Malicious mobile threats report 2011/2012

This report details specific attack vectors on mobile devices over the past year, defines new and emerging mobile threats, and gives mobile users practical advice to protect themselves from malicious attacks. Mobile malware attacks and other exploits are no longer just theoretical occurrences discussed by...