War of End-User Malware

Malware-ridden Device 1 approaches Malware-ridden Device 2

A network surveillance tool plots the quick interactions like a slow RTS.

30% of the viruses and trojans in Device 1 infest Device 2
but the remaining 70% are replaced by Device 2’s worms and spywares.