WeLiveSecurity - News, views, and insight from the ESET security community

Figure 1: Infected applications