We analyzed the statistics we had collected from May to August 2015 and identified three main Trojan families that use root privileges on the device to achieve their goals.
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed