2

Report: 25% of mobile endpoints have faced malicious apps

 2 years ago
source link: https://venturebeat.com/2022/03/14/report-25-of-mobile-endpoints-have-faced-malicious-apps/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Report: 25% of mobile endpoints have faced malicious apps

Image Credit: Getty Images

Did you miss a session at the Data Summit? Watch On-Demand Here.


According to a new report by Zimperium, one in four mobile endpoints have encountered malicious apps. The report takes a look at the mobile attack surface, examining a year’s worth of mobile threat data in review, including a deeper concentration on mobile device threat and mobile application threat trends. It also provides a roundup and topical analysis of mobile threat data from the field, including prominent mobile attack vectors, regional analyses, exploited mobile vulnerabilities, mobile phishing trends and mobile malware trends.

There is no denying that mobile endpoints are exposed to increased threats, putting enterprise data and services at risk. This data point is one of the most surprising observations from the enterprise clients and the risk data reported back from the Android and iOS devices secured by Zimperium globally.

Furthermore, in 2021, there was a 466% increase in exploited, zero-day vulnerabilities used in active attacks against mobile endpoints. Despite the massive popularity of mobile devices over the previous decade, the last three years saw zero-day vulnerabilities that target mobile endpoints becoming a more significant challenge than ever before. In 2021, one in three zero-day attacks in the wild have targeted mobile endpoints, with iOS devices accounting for 60% of the victims in these attacks.

Bar graph. Expected events per year per device. In order from most popular to least popular: mobile malware; man-in-the-middle; malicious website; scans; known malicious network; traffic manipulation; compromised devices; rogue access point.

In the world of BYOD, the mobile device attack surface is no longer a consumer-only threat. Each one represents a risk to enterprise security. In the hands of the right attackers, any exploit could be an effective tool in an attack on a managed or unmanaged mobile endpoint, helping them gain a foothold in enterprise systems and networks.

Read the full report by Zimperium.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK