• Spyware: Applications that accumulate user’s information without the users approval.
• Malware: Applications that behave maliciously on a device and exploit user’s information, consume resources or execute unwanted tasks as send messages or grant network access.
• Privacy Threats: Applications that access to not needed sensitive data to execute its task.
• Vulnerable Applications: Applications that possess a few vulnerabilities, that can be subjugated by an attacker, can cause various damages such as automatically download a malware without user’s knowledge.