Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

iOS More Exposed To Attack Than Android—220 Million Devices Analyzed

Dec 26, 2024 - forbes.com
The latest Mobile Threat Landscape Report for 2024 by Lookout reveals that iOS devices are more exposed to phishing attacks than Android devices. In Q3 2024, 18.4% of iOS devices were targeted compared to 11.4% of Android devices. The analysis, based on data from 220 million devices and 360 million apps, suggests that the higher exposure of iOS devices to phishing attacks could be due to their greater popularity in enterprise settings, where there are more than twice as many iOS devices as Android ones among Lookout users. Consequently, 19% of enterprise iOS devices faced at least one phishing attack in the first three quarters of 2024, compared to 10.9% of Android devices.

The report highlights the increasing trend of threat actors targeting mobile devices to access corporate cloud apps with sensitive data, using advanced phishing tactics like AI-powered impersonation attacks. David Richardson from Lookout emphasizes the evolving nature of cyber threats and the need for both iOS and Android users to stay vigilant against sophisticated phishing attacks. As these threats continue to grow, users are encouraged to educate themselves on protective measures to safeguard their devices and data.

Key takeaways:

```html
  • iOS devices are more exposed to phishing attacks than Android devices, with 18.4% of iOS devices targeted compared to 11.4% of Android devices in Q3 2024.
  • The Lookout report used data from 220 million devices and 360 million apps to analyze mobile threats, identifying over 473 million malicious sites since 2019.
  • Enterprise iOS devices are more frequently targeted by phishing attacks, with 19% exposed in each of the first three quarters of 2024, compared to 10.9% of Android devices.
  • Phishing attacks are becoming more advanced, utilizing AI-powered impersonation tactics, and are increasingly targeting mobile devices as gateways to sensitive corporate data.
```
View Full Article

Comments (0)

Be the first to comment!