Alarming Surge In Malicious Apps

Ransomware has also become a popular form of attack in recent years and is significantly growing and the high profile Kaseya and Pegasus attacks are just the latest in a series of cyber attacks. With the pandemic forcing employees away from the office and outside of IT’s reach, the threat of bad actors online has increased.

Appurity, the cross-platform mobility specialist and Lookout, an integrated endpoint-to-cloud security company, joined forces to look at the data and their investigation has revealed that mobile users have experienced 200% more malicious apps this year, compared to the same period in 2020.  

They also found that the alarming new surge in malicious mobile apps is a particularly  serious threat to iPhone users. 

During the First 6 months of this year: 

  • Mobile users experienced over 200% more malicious mobile apps than the same period in 2020.
  • More than 1 in 5 enterprise mobile users encountered at least one phishing attack.
  • There was a 30% increase in phishing encounters for enterprise users versus the same period in 2020.
  • Over 50% of consumer users encountered at least one phishing encounter in the same period in 2020

Appurity conduct many mobile assessments to evaluate customers' infrastructure, their apps, security posture of devices and whether this meets regulations such as Cyber Essentials Plus or ISO.

“What’s clear is that the pandemic, and the way our working patterns have changed, have opened up new opportunities for cyber threats to prevail. The data, whilst shocking, doesn’t surprise me... These attacks are becoming increasingly sophisticated. They understand that remote/hybrid work is an opportunity for them so that’s a big factor here." commented Appurity's Steve Whiter.

Appurity:        Forbes:       Purplesec:     

You Might Also Read: 

Mobile Users Are A Security Weakspot:

 

« Apple Uses Surveillance To Detect Child Abuse
Cyber Operations In Wartime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

IEC Cyber Ltd

IEC Cyber Ltd

IEC Cyber provides Cyber security consulting services for OT systems, with emphasis on process systems aligned to IEC 61508 and IEC 61511. We are a preferred consulting firm for IEC 62443 services.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.