Android becoming mobile malware magnet, says report
Summary: As for the breakdown of Android malware, Blue Coat noted 58 percent was Android root exploits and rogue software.
The Android platform is becoming a key mobile target for cybercriminals, who are getting much more efficient with their malware, according to a Blue Coat Systems report.
In a mobile malware report, Blue Coat notes that Android is a popular target. Here's a look at the volume of Android malware:

Blue Coat noted:
The Android-based malware blocked by WebPulse included an Android root exploit and a variety of rogue Android software. Forty percent of Android malware was delivered via malnets, demonstrating how cybercriminals can successfully utilize embedded infrastructures to attack mobile users. In the most recent six months, WebPulse also blocked an increasing number of unique malicious Android applications.
As for the breakdown of Android malware, Blue Coat noted 58 percent was Android root exploits and rogue software. Android malware via malnets---networks designed to deliver malicious payloads---was 40 percent of the total.
The Android malware issue is increasingly a buzz kill for the enterprise. CXOs are balking at having to support multiple flavors of Android and have largely focused on Apple's iOS for their bring your own device policies.
Another notable nugget from the Blue Coat report was that pornography is a key threat vector on mobile devices. The catch is mobile users go to porn sites less than 1 percent of the time.

Blue Coat said:
In 2012, the most dangerous place for mobile users was pornography. More than 20 percent of the time that a user went to a malicious site, they were coming from a pornography site. It is important to note that mobile users are going to pornography sites less than one percent of the time. When they do visit pornography sites, though, they have a high risk of finding a threat.
Interestingly, when malware first moved to the Internet, pornography was one of the leading sources of malware for desktop users. The prevalence of pornography as the leading threat vector for desktop users has ebbed, giving way to attacks that target much larger user populations, such as search engine poisoning.
In the desktop environment, pornography continued to fall as a threat vector as it became easier to target a large number of users on places like search engines or social networking sites.
Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.
Talkback
Makes you wonder
The Explanation is simple.
https://play.google.com/store/apps/details?id=com.bluecoat.k9.android&hl=en
In other words, the 'report' is promotional material for their product.
The author of this 'article' is Larry Dignan, who is "Editor in Chief of ZDNet". Surely it doesn't take an editor-in-chief to see how publishing this as an 'article' degrades ZDNet.
I hear Google has an entire building of programers
Yeah,
exactly
http://goo.gl/jpnTr
"40% of iOS apps invade your privacy without permission"
No no no
evil?why?because he fight for freedom, fight against thiefs Microsoft Apple
Re: "40% of iOS apps invade your privacy without permission"
yes, Android is really more mature
Root Exploit - sounds scary
that's FUD folks!
malware comes only with windoze.
good old days
something doesn't make sense here
But they're not.
A very good reason more phones should be running newer Android versions.
Android becoming mobile malware magnet, says report
Trying to proclaim some type knowledge
This is quite obvious
That's what happens when the developer doesn't give a darn about the user
While Gingerbread is currently in more than 80% of the devices sold today, Google hasn't release A SINGLE patch to the over 50 thousand vulnerabilities that it claimed fixed by JB.
While others companies (including most Linux distros) constantly release patches to older version, Google just says "F* you user" ... buy a new phone if you want the update.
They are getting all your private info. They don't care if your phone is compromised and turned into a bootnet (while you pay for the bandwidth).
80%
FUD
This is a terrible article and not what I've come to expect from Mr. Dignan. Even the writing is bad.