The document discusses the growing threat of mobile malware, particularly user-mode rootkits that exploit mobile operating systems like Android, Blackberry, and iOS, making them vulnerable to cybercrime. It highlights techniques used by attackers, such as abusing application programming interfaces (APIs) to conceal their presence and compromise sensitive data. Additionally, the document addresses the security flaws that arise from poorly managed applications and the inevitable challenges in combating malware due to rapid application proliferation.