The results of that study showed "nearly half of the analyzed applications leaked various forms of sensitive data to third parties. In most cases, application developers used pre-packaged code purchased from advertising agencies, originally intended to collect device information that could be used to build advertising profiles of the device user."
The report also draws from the general experiences last year of Juniper's own customer base using the Junos Pulse Mobile Security Suite software on smartphones. "Spyware capable of monitoring any and all forms of communication to and from a mobile device accounted for 61 percent of all reported Juniper mobile customer infections," the report states. For those using Android, it was 100 percent of all reported infections.
Juniper also notes that it found one-third of registered software users lost their device at some point and were forced to use the Junos Pulse software "locate device" capability, with 77 percent of these users then deciding to send a command to lock the device to stop someone using it. About a third never issued an unlock command, which brings Juniper to believe these devices were never found.
Read more about wide area network in Network World's Wide Area Network section.