(Source: Android Headlines) There are numerous exploits for Windows, Linux, Mac, and mobile devices that use system software vulnerabilities in tandem with special software that can be pushed on a user unwittingly or bundled with software that a user actually wants. Even with users becoming more aware of security risks online and software and …