In this case, though, users would have been exploiting their own devices. Currently most malicious code for mobile devices consists of Trojans that pose as legitimate applications. These applications are uploaded to mobile “app” marketplaces in the hopes that users will download and install them.