This whitepaper expands on several highly popular applications that cyber-criminals are using to compromise devices, as well as the potential impact on the victim.