Alarming Surge In Malicious Apps

Ransomware has also become a popular form of attack in recent years and is significantly growing and the high profile Kaseya and Pegasus attacks are just the latest in a series of cyber attacks. With the pandemic forcing employees away from the office and outside of IT’s reach, the threat of bad actors online has increased.

Appurity, the cross-platform mobility specialist and Lookout, an integrated endpoint-to-cloud security company, joined forces to look at the data and their investigation has revealed that mobile users have experienced 200% more malicious apps this year, compared to the same period in 2020.  

They also found that the alarming new surge in malicious mobile apps is a particularly  serious threat to iPhone users. 

During the First 6 months of this year: 

  • Mobile users experienced over 200% more malicious mobile apps than the same period in 2020.
  • More than 1 in 5 enterprise mobile users encountered at least one phishing attack.
  • There was a 30% increase in phishing encounters for enterprise users versus the same period in 2020.
  • Over 50% of consumer users encountered at least one phishing encounter in the same period in 2020

Appurity conduct many mobile assessments to evaluate customers' infrastructure, their apps, security posture of devices and whether this meets regulations such as Cyber Essentials Plus or ISO.

“What’s clear is that the pandemic, and the way our working patterns have changed, have opened up new opportunities for cyber threats to prevail. The data, whilst shocking, doesn’t surprise me... These attacks are becoming increasingly sophisticated. They understand that remote/hybrid work is an opportunity for them so that’s a big factor here." commented Appurity's Steve Whiter.

Appurity:        Forbes:       Purplesec:     

You Might Also Read: 

Mobile Users Are A Security Weakspot:

 

« Apple Uses Surveillance To Detect Child Abuse
Cyber Operations In Wartime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.