This document discusses malware threats on mobile platforms and provides 3 key points:
1. It describes new malware threats that disguise as news or other apps to install on mobile phones and steal private information like messages and contacts without the user's knowledge.
2. It analyzes the history of malware confrontation from the late 1980s to the present, noting the emergence of systematical confrontation using botnets in the 2000s and the current state of an underground industrial system.
3. It outlines solutions for analyzing and detecting mobile malware through techniques like disassembling code, behavior monitoring, and automatic comprehensive analysis to understand malware behavior and provide security.