var varname = "wijax_b40d091110cc2b697057f89907722e6b"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"\" class=\"term-link\" title=\"103 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>103<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Android\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/android\/\"><span class=\"bar\" style=\"width:23.300970873786%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+android\/\" class=\"term-link\" title=\"24 topics\">Android<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>24<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smartphones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smartphones\/\"><span class=\"bar\" style=\"width:13.592233009709%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+smartphones\/\" class=\"term-link\" title=\"14 topics\">smartphones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:10.679611650485%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+cybersecurity\/\" class=\"term-link\" title=\"11 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"operating systems\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/operating-systems\/\"><span class=\"bar\" style=\"width:10.679611650485%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+operating-systems\/\" class=\"term-link\" title=\"11 topics\">operating systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"OS X\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/os-x\/\"><span class=\"bar\" style=\"width:9.7087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+os-x\/\" class=\"term-link\" title=\"10 topics\">OS X<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>10<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:8.7378640776699%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+cloud-computing\/\" class=\"term-link\" title=\"9 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iPhone\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/iphone\/\"><span class=\"bar\" style=\"width:8.7378640776699%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+iphone\/\" class=\"term-link\" title=\"9 topics\">iPhone<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile phones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-phones\/\"><span class=\"bar\" style=\"width:7.7669902912621%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+mobile-phones\/\" class=\"term-link\" title=\"8 topics\">mobile phones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iOS\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ios\/\"><span class=\"bar\" style=\"width:6.7961165048544%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+ios\/\" class=\"term-link\" title=\"7 topics\">iOS<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"big data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/big-data\/\"><span class=\"bar\" style=\"width:6.7961165048544%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+big-data\/\" class=\"term-link\" title=\"7 topics\">big data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"tablets\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/tablets\/\"><span class=\"bar\" style=\"width:5.8252427184466%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+tablets\/\" class=\"term-link\" title=\"6 topics\">tablets<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"apps\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apps\/\"><span class=\"bar\" style=\"width:5.8252427184466%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+apps\/\" class=\"term-link\" title=\"6 topics\">apps<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile applications\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-applications\/\"><span class=\"bar\" style=\"width:4.8543689320388%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+mobile-applications\/\" class=\"term-link\" title=\"5 topics\">mobile applications<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"firewall\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/firewall\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+firewall\/\" class=\"term-link\" title=\"4 topics\">firewall<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"social media\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/social-media\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+social-media\/\" class=\"term-link\" title=\"4 topics\">social media<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+encryption\/\" class=\"term-link\" title=\"4 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft Windows\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/microsoft-windows\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+microsoft-windows\/\" class=\"term-link\" title=\"3 topics\">Microsoft Windows<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iTunes\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/itunes\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+itunes\/\" class=\"term-link\" title=\"3 topics\">iTunes<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iPad\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ipad\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+ipad\/\" class=\"term-link\" title=\"3 topics\">iPad<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bitcoin\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bitcoin\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+bitcoin\/\" class=\"term-link\" title=\"2 topics\">Bitcoin<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"wi-fi\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/wi-fi\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+wi-fi\/\" class=\"term-link\" title=\"2 topics\">wi-fi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile operating systems\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-operating-systems\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+mobile-operating-systems\/\" class=\"term-link\" title=\"2 topics\">mobile operating systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet of things (IoT)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet-of-things-iot\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+internet-of-things-iot\/\" class=\"term-link\" title=\"2 topics\">internet of things (IoT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cloud Storage\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-storage\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+cloud-storage\/\" class=\"term-link\" title=\"2 topics\">Cloud Storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"advertising\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/advertising\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+advertising\/\" class=\"term-link\" title=\"2 topics\">advertising<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile devices\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-devices\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+mobile-devices\/\" class=\"term-link\" title=\"2 topics\">mobile devices<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iWork\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/iwork\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+iwork\/\" class=\"term-link\" title=\"2 topics\">iWork<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"machine to machine (M2M)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/machine-to-machine-m2m\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+machine-to-machine-m2m\/\" class=\"term-link\" title=\"2 topics\">machine to machine (M2M)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Plague\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/plague\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+plague\/\" class=\"term-link\" title=\"1 topics\">Plague<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FaceNiff\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/faceniff\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+faceniff\/\" class=\"term-link\" title=\"1 topics\">FaceNiff<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-data\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+mobile-data\/\" class=\"term-link\" title=\"1 topics\">mobile data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"file-system encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/file-system-encryption\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+file-system-encryption\/\" class=\"term-link\" title=\"1 topics\">file-system encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"web apps\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/web-apps\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+web-apps\/\" class=\"term-link\" title=\"1 topics\">web apps<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"near field communication (NFC)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/near-field-communication-nfc\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+near-field-communication-nfc\/\" class=\"term-link\" title=\"1 topics\">near field communication (NFC)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon Web Services (AWS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/amazon-web-services-aws\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+amazon-web-services-aws\/\" class=\"term-link\" title=\"1 topics\">Amazon Web Services (AWS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"content delivery networks (CDNs)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/content-delivery-networks-cdns\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+content-delivery-networks-cdns\/\" class=\"term-link\" title=\"1 topics\">content delivery networks (CDNs)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Linux\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/linux\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+linux\/\" class=\"term-link\" title=\"1 topics\">Linux<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"broadband\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/broadband\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+broadband\/\" class=\"term-link\" title=\"1 topics\">broadband<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ad hoc networks\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ad-hoc-networks\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+ad-hoc-networks\/\" class=\"term-link\" title=\"1 topics\">ad hoc networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Windows Phone\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/windows-phone\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+windows-phone\/\" class=\"term-link\" title=\"1 topics\">Windows Phone<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"location-based services (LBS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/location-based-services-lbs\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+location-based-services-lbs\/\" class=\"term-link\" title=\"1 topics\">location-based services (LBS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"search\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/search\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+search\/\" class=\"term-link\" title=\"1 topics\">search<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Gmail\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/gmail\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+gmail\/\" class=\"term-link\" title=\"1 topics\">Gmail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"information technology (IT)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/information-technology-it\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+information-technology-it\/\" class=\"term-link\" title=\"1 topics\">information technology (IT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kindle\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/kindle\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+kindle\/\" class=\"term-link\" title=\"1 topics\">Kindle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TRAP XP\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/trap-xp\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+trap-xp\/\" class=\"term-link\" title=\"1 topics\">TRAP XP<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile device management (MDM)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-device-management-mdm\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+mobile-device-management-mdm\/\" class=\"term-link\" title=\"1 topics\">mobile device management (MDM)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bluetooth\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bluetooth\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+bluetooth\/\" class=\"term-link\" title=\"1 topics\">Bluetooth<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"MacBook Air\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/macbook-air\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware+macbook-air\/\" class=\"term-link\" title=\"1 topics\">MacBook Air<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Apple\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apple\/\"><span class=\"bar\" style=\"width:30.097087378641%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=apple\" class=\"term-link\" title=\"31 topics\">Apple<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>31<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:25.242718446602%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=google\" class=\"term-link\" title=\"26 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>26<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:7.7669902912621%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=microsoft\" class=\"term-link\" title=\"8 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Facebook\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/facebook\/\"><span class=\"bar\" style=\"width:5.8252427184466%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=facebook\" class=\"term-link\" title=\"6 topics\">Facebook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Symantec\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/symantec\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=symantec\" class=\"term-link\" title=\"4 topics\">Symantec<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cisco Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cisco-systems\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=cisco-systems\" class=\"term-link\" title=\"4 topics\">Cisco Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=cloudflare\" class=\"term-link\" title=\"3 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Oracle\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/oracle\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=oracle\" class=\"term-link\" title=\"3 topics\">Oracle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"AVG\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/avg\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=avg\" class=\"term-link\" title=\"3 topics\">AVG<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Target\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/target\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=target\" class=\"term-link\" title=\"3 topics\">Target<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Massachusetts Institute of Technology (MIT)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/massachusetts-institute-of-technology-mit\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=massachusetts-institute-of-technology-mit\" class=\"term-link\" title=\"3 topics\">Massachusetts Institute of Technology (MIT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sourcefire\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sourcefire\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=sourcefire\" class=\"term-link\" title=\"2 topics\">Sourcefire<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Verizon Wireless\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/verizon-wireless\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=verizon-wireless\" class=\"term-link\" title=\"2 topics\">Verizon Wireless<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BlackBerry\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/blackberry\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=blackberry\" class=\"term-link\" title=\"2 topics\">BlackBerry<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Nokia\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/nokia\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=nokia\" class=\"term-link\" title=\"2 topics\">Nokia<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FBI\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fbi\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=fbi\" class=\"term-link\" title=\"2 topics\">FBI<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Verizon\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/verizon\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=verizon\" class=\"term-link\" title=\"2 topics\">Verizon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Imperva\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/imperva\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=imperva\" class=\"term-link\" title=\"2 topics\">Imperva<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Check Point\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/check-point\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=check-point\" class=\"term-link\" title=\"2 topics\">Check Point<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"orange\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/orange\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=orange\" class=\"term-link\" title=\"2 topics\">orange<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Android Market\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/android-market\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=android-market\" class=\"term-link\" title=\"2 topics\">Android Market<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Government Communications Headquarters (GCHQ)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/government-communications-headquarters-gchq\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=government-communications-headquarters-gchq\" class=\"term-link\" title=\"2 topics\">Government Communications Headquarters (GCHQ)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"McAfee\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mcafee\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=mcafee\" class=\"term-link\" title=\"2 topics\">McAfee<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Salesforce\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/salesforce\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=salesforce\" class=\"term-link\" title=\"2 topics\">Salesforce<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Adobe\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/adobe\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=adobe\" class=\"term-link\" title=\"2 topics\">Adobe<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Twitter\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/twitter\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=twitter\" class=\"term-link\" title=\"2 topics\">Twitter<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Avast\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/avast\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=avast\" class=\"term-link\" title=\"2 topics\">Avast<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Deep Sea Marketing\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/deep-sea-marketing\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=deep-sea-marketing\" class=\"term-link\" title=\"2 topics\">Deep Sea Marketing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=sony\" class=\"term-link\" title=\"2 topics\">Sony<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"T-Mobile\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/t-mobile\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=t-mobile\" class=\"term-link\" title=\"2 topics\">T-Mobile<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Solazyme\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/solazyme\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=solazyme\" class=\"term-link\" title=\"1 topics\">Solazyme<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Yubico\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/yubico\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=yubico\" class=\"term-link\" title=\"1 topics\">Yubico<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dasient\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/dasient\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=dasient\" class=\"term-link\" title=\"1 topics\">Dasient<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Location Labs\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/location-labs\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=location-labs\" class=\"term-link\" title=\"1 topics\">Location Labs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Perimeter E\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/perimeter-e\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=perimeter-e\" class=\"term-link\" title=\"1 topics\">Perimeter E<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"home depot\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/home-depot\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=home-depot\" class=\"term-link\" title=\"1 topics\">home depot<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Electronic Frontier Foundation (EFF)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/electronic-frontier-foundation-eff\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=electronic-frontier-foundation-eff\" class=\"term-link\" title=\"1 topics\">Electronic Frontier Foundation (EFF)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Israel Defense Forces\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/israel-defense-forces\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=israel-defense-forces\" class=\"term-link\" title=\"1 topics\">Israel Defense Forces<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"VeriSign\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/verisign\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=verisign\" class=\"term-link\" title=\"1 topics\">VeriSign<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Juniper Networks\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/juniper-networks\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=juniper-networks\" class=\"term-link\" title=\"1 topics\">Juniper Networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Andreessen-Horowitz\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/andreessen-horowitz\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=andreessen-horowitz\" class=\"term-link\" title=\"1 topics\">Andreessen-Horowitz<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"P.F. Chang&#039;s\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/p-f-changs\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=p-f-changs\" class=\"term-link\" title=\"1 topics\">P.F. Chang&#039;s<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mithril Capital\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mithril-capital\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=mithril-capital\" class=\"term-link\" title=\"1 topics\">Mithril Capital<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony Pictures Entertainment\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony-pictures-entertainment\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=sony-pictures-entertainment\" class=\"term-link\" title=\"1 topics\">Sony Pictures Entertainment<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Qualcomm Ventures\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/qualcomm-ventures\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=qualcomm-ventures\" class=\"term-link\" title=\"1 topics\">Qualcomm Ventures<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kaspersky Lab\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/kaspersky-lab\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=kaspersky-lab\" class=\"term-link\" title=\"1 topics\">Kaspersky Lab<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Greylock Partners\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/greylock-partners\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=greylock-partners\" class=\"term-link\" title=\"1 topics\">Greylock Partners<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PrivateCore\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/privatecore\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=privatecore\" class=\"term-link\" title=\"1 topics\">PrivateCore<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"GetJar\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/getjar\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=getjar\" class=\"term-link\" title=\"1 topics\">GetJar<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Khosla Ventures\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/khosla-ventures\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?company=khosla-ventures\" class=\"term-link\" title=\"1 topics\">Khosla Ventures<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Carson Sweet\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/carson-sweet\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?person=carson-sweet\" class=\"term-link\" title=\"1 topics\">Carson Sweet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Peter Thiel\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/peter-thiel\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?person=peter-thiel\" class=\"term-link\" title=\"1 topics\">Peter Thiel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jon Oltsik\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/jon-oltsik\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?person=jon-oltsik\" class=\"term-link\" title=\"1 topics\">Jon Oltsik<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mark Zuckerberg\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/mark-zuckerberg\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?person=mark-zuckerberg\" class=\"term-link\" title=\"1 topics\">Mark Zuckerberg<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"David Ulevitch\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/david-ulevitch\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?person=david-ulevitch\" class=\"term-link\" title=\"1 topics\">David Ulevitch<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Orion Hindawi\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/orion-hindawi\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?person=orion-hindawi\" class=\"term-link\" title=\"1 topics\">Orion Hindawi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ilya Zudin\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/ilya-zudin\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?person=ilya-zudin\" class=\"term-link\" title=\"1 topics\">Ilya Zudin<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security\/\"><span class=\"bar\" style=\"width:45.631067961165%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=security\" class=\"term-link\" title=\"47 topics\">security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>47<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:11.650485436893%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=hacking\" class=\"term-link\" title=\"12 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>12<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mobile-security\/\"><span class=\"bar\" style=\"width:7.7669902912621%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=mobile-security\" class=\"term-link\" title=\"8 topics\">mobile security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mobile\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mobile\/\"><span class=\"bar\" style=\"width:7.7669902912621%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=mobile\" class=\"term-link\" title=\"8 topics\">Mobile<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:6.7961165048544%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=privacy\" class=\"term-link\" title=\"7 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"moconews\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/moconews\/\"><span class=\"bar\" style=\"width:6.7961165048544%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=moconews\" class=\"term-link\" title=\"7 topics\">moconews<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mac\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mac\/\"><span class=\"bar\" style=\"width:6.7961165048544%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=mac\" class=\"term-link\" title=\"7 topics\">Mac<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"companies\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/companies\/\"><span class=\"bar\" style=\"width:6.7961165048544%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=companies\" class=\"term-link\" title=\"7 topics\">companies<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BYOD\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/byod\/\"><span class=\"bar\" style=\"width:4.8543689320388%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=byod\" class=\"term-link\" title=\"5 topics\">BYOD<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data-security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-security\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=data-security\" class=\"term-link\" title=\"4 topics\">data-security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"legal\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/legal\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=legal\" class=\"term-link\" title=\"4 topics\">legal<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/surveillance\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=surveillance\" class=\"term-link\" title=\"4 topics\">surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyberwarfare\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyberwarfare\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=cyberwarfare\" class=\"term-link\" title=\"4 topics\">Cyberwarfare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=cloud-security\" class=\"term-link\" title=\"4 topics\">cloud security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Botnet\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/botnet\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=botnet\" class=\"term-link\" title=\"3 topics\">Botnet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"anti-virus\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/anti-virus\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=anti-virus\" class=\"term-link\" title=\"3 topics\">anti-virus<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"worm\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/worm\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=worm\" class=\"term-link\" title=\"3 topics\">worm<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"phishing\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/phishing\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=phishing\" class=\"term-link\" title=\"3 topics\">phishing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"web security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/web-security\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=web-security\" class=\"term-link\" title=\"3 topics\">web security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stuxnet\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/stuxnet\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=stuxnet\" class=\"term-link\" title=\"3 topics\">Stuxnet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"denial-of-service (DoS)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/denial-of-service-dos\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=denial-of-service-dos\" class=\"term-link\" title=\"3 topics\">denial-of-service (DoS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"infection\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/infection\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=infection\" class=\"term-link\" title=\"3 topics\">infection<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"research &amp; metrics\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/research-metrics\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=research-metrics\" class=\"term-link\" title=\"2 topics\">research &amp; metrics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"social networking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/social-networking\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=social-networking\" class=\"term-link\" title=\"2 topics\">social networking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"online security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/online-security\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=online-security\" class=\"term-link\" title=\"2 topics\">online security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"network security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/network-security\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=network-security\" class=\"term-link\" title=\"2 topics\">network security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"enterprise IT\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/enterprise-it\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=enterprise-it\" class=\"term-link\" title=\"2 topics\">enterprise IT<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Incapsula\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/incapsula\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=incapsula\" class=\"term-link\" title=\"2 topics\">Incapsula<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mac defender\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mac-defender\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=mac-defender\" class=\"term-link\" title=\"2 topics\">mac defender<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Botnets\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/botnets\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=botnets\" class=\"term-link\" title=\"2 topics\">Botnets<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Telcos\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/telcos\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=telcos\" class=\"term-link\" title=\"2 topics\">Telcos<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"regulations\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/regulations\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=regulations\" class=\"term-link\" title=\"2 topics\">regulations<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"technologies \/ formats\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/technologies-formats\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=technologies-formats\" class=\"term-link\" title=\"2 topics\">technologies \/ formats<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"software updates\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/software-updates\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=software-updates\" class=\"term-link\" title=\"2 topics\">software updates<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"lookout security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/lookout-security\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=lookout-security\" class=\"term-link\" title=\"2 topics\">lookout security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Enterprise Mobility\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/enterprise-mobility\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=enterprise-mobility\" class=\"term-link\" title=\"2 topics\">Enterprise Mobility<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"rootkit\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/rootkit\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=rootkit\" class=\"term-link\" title=\"2 topics\">rootkit<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"vulnerability\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/vulnerability\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=vulnerability\" class=\"term-link\" title=\"2 topics\">vulnerability<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"China\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/china\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=china\" class=\"term-link\" title=\"2 topics\">China<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"jailbreaking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/jailbreaking\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=jailbreaking\" class=\"term-link\" title=\"2 topics\">jailbreaking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ssh\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/ssh\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=ssh\" class=\"term-link\" title=\"2 topics\">ssh<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"copyright-infringement\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/copyright-infringement\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=copyright-infringement\" class=\"term-link\" title=\"2 topics\">copyright-infringement<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"venture capital (VC)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/venture-capital-vc\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=venture-capital-vc\" class=\"term-link\" title=\"2 topics\">venture capital (VC)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy international\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy-international\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=privacy-international\" class=\"term-link\" title=\"2 topics\">privacy international<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Flame\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/flame\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=flame\" class=\"term-link\" title=\"2 topics\">Flame<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"adware\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/adware\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=adware\" class=\"term-link\" title=\"2 topics\">adware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FinFisher\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/finfisher\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=finfisher\" class=\"term-link\" title=\"2 topics\">FinFisher<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"productibty\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/productibty\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=productibty\" class=\"term-link\" title=\"1 topics\">productibty<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"productivity superstar\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/productivity-superstar\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=productivity-superstar\" class=\"term-link\" title=\"1 topics\">productivity superstar<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud server\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-server\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?tag=cloud-server\" class=\"term-link\" title=\"1 topics\">cloud server<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"David Meyer\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/superglaze\/\"><span class=\"bar\" style=\"width:11.650485436893%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=superglaze\" class=\"term-link\" title=\"12 topics\">David Meyer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>12<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Darrell Etherington\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/darrelletherington\/\"><span class=\"bar\" style=\"width:10.679611650485%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-darrelletherington\" class=\"term-link\" title=\"11 topics\">Darrell Etherington<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Derrick Harris\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/dharrisstructure\/\"><span class=\"bar\" style=\"width:7.7669902912621%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=dharrisstructure\" class=\"term-link\" title=\"8 topics\">Derrick Harris<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kevin Fitchard\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kevinfitchard\/\"><span class=\"bar\" style=\"width:5.8252427184466%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-kevinfitchard\" class=\"term-link\" title=\"6 topics\">Kevin Fitchard<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Edit Staff\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/gigaedit\/\"><span class=\"bar\" style=\"width:4.8543689320388%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-gigaedit\" class=\"term-link\" title=\"5 topics\">Edit Staff<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kevin C. Tofel\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kevintofel\/\"><span class=\"bar\" style=\"width:4.8543689320388%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=kevintofel\" class=\"term-link\" title=\"5 topics\">Kevin C. Tofel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hrbrmstr\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/hrbrmstr\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-hrbrmstr\" class=\"term-link\" title=\"4 topics\">hrbrmstr<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ryan Kim\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/rkim\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-rkim\" class=\"term-link\" title=\"4 topics\">Ryan Kim<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lauren Hockenson\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/laurenhockenson1\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-laurenhockenson1\" class=\"term-link\" title=\"4 topics\">Lauren Hockenson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jonathan Vanian\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jonathanvanian\/\"><span class=\"bar\" style=\"width:3.8834951456311%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-jonathanvanian\" class=\"term-link\" title=\"4 topics\">Jonathan Vanian<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dave Greenbaum\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/calldrdave\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-calldrdave\" class=\"term-link\" title=\"3 topics\">Dave Greenbaum<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Barb Darrow\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/barbdarrow\/\"><span class=\"bar\" style=\"width:2.9126213592233%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"3 topics\">Barb Darrow<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lawrence M. Walsh (Larry Walsh)\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/larrywalsh\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-larrywalsh\" class=\"term-link\" title=\"2 topics\">Lawrence M. Walsh (Larry Walsh)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Om Malik\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/om\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=om\" class=\"term-link\" title=\"2 topics\">Om Malik<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"liamc\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/liamc\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-liamc\" class=\"term-link\" title=\"2 topics\">liamc<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Erica Ogg\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/ericaogg\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-ericaogg\" class=\"term-link\" title=\"2 topics\">Erica Ogg<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Janko Roettgers\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jankor\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-jankor\" class=\"term-link\" title=\"2 topics\">Janko Roettgers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cap-alexcolon\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/alexcolon\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-alexcolon\" class=\"term-link\" title=\"2 topics\">cap-alexcolon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tom Krazit\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/tomk1\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-tomk1\" class=\"term-link\" title=\"2 topics\">Tom Krazit<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Colin Gibbs\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/colingibbs\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=colingibbs\" class=\"term-link\" title=\"2 topics\">Colin Gibbs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Laura Stuart\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/laurastuart\/\"><span class=\"bar\" style=\"width:1.9417475728155%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-laurastuart\" class=\"term-link\" title=\"2 topics\">Laura Stuart<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Keren Elazari\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kerenelazari\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-kerenelazari\" class=\"term-link\" title=\"1 topics\">Keren Elazari<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Karen Leland\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kleland\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-kleland\" class=\"term-link\" title=\"1 topics\">Karen Leland<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sebastian Rupley\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/sebastian\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-sebastian\" class=\"term-link\" title=\"1 topics\">Sebastian Rupley<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Simon Mackie\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/simonmackie\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-simonmackie\" class=\"term-link\" title=\"1 topics\">Simon Mackie<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Scott Blitstein\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/scottblitz\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-scottblitz\" class=\"term-link\" title=\"1 topics\">Scott Blitstein<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jeff St. John\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jeffstjohn\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-jeffstjohn\" class=\"term-link\" title=\"1 topics\">Jeff St. John<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ki Mae Heussner\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kimaeheussner\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=kimaeheussner\" class=\"term-link\" title=\"1 topics\">Ki Mae Heussner<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matt Sarrel\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/mattsarrel\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=mattsarrel\" class=\"term-link\" title=\"1 topics\">Matt Sarrel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"A\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/acroll\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-acroll\" class=\"term-link\" title=\"1 topics\">A<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Charles Jade\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/charlesjade\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=charlesjade\" class=\"term-link\" title=\"1 topics\">Charles Jade<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jeff Roberts\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jeffr\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-jeffr\" class=\"term-link\" title=\"1 topics\">Jeff Roberts<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Richard Stiennon\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/richardstiennon\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-richardstiennon\" class=\"term-link\" title=\"1 topics\">Richard Stiennon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Craig Rubens\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/crankarms\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-crankarms\" class=\"term-link\" title=\"1 topics\">Craig Rubens<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Michael Finneran\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/michaelfinneran\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-michaelfinneran\" class=\"term-link\" title=\"1 topics\">Michael Finneran<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Andrew Bednarz\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/bed42\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-bed42\" class=\"term-link\" title=\"1 topics\">Andrew Bednarz<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tom Reestman\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/thesmallwave\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/malware\/?authors=cap-thesmallwave\" class=\"term-link\" title=\"1 topics\">Tom Reestman<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:88.349514563107%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/news-post\/?technology=malware\" class=\"term-link\" title=\"91 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>91<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Report\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/report\/\"><span class=\"bar\" style=\"width:6.7961165048544%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/report\/?technology=malware\" class=\"term-link\" title=\"7 topics\">Report<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Chart\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/chart\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/chart\/?technology=malware\" class=\"term-link\" title=\"1 topics\">Chart<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/?technology=malware\" class=\"term-link\" title=\"1 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:86.407766990291%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/gigaom\/?technology=malware\" class=\"term-link\" title=\"89 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>89<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Research\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/research\/\"><span class=\"bar\" style=\"width:10.679611650485%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/research\/?technology=malware\" class=\"term-link\" title=\"11 topics\">Research<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"paidContent\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/paidcontent\/\"><span class=\"bar\" style=\"width:0.97087378640777%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/paidcontent\/?technology=malware\" class=\"term-link\" title=\"1 topics\">paidContent<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:92.233009708738%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/free\/?technology=malware\" class=\"term-link\" title=\"95 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>95<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Subscription\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/subscription\/\"><span class=\"bar\" style=\"width:7.7669902912621%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/subscription\/?technology=malware\" class=\"term-link\" title=\"8 topics\">Subscription<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n<\/ul>\n<\/div>";