| WeLiveSecurity

Figure 1: Infected applications