As the cybersecurity firm Lookout Incorporated has identified, there is a growing trend of hackers trying to capture login information. They are using phishing techniques and harmful applications to achieve this. It is suggested that both companies and individual users should ensure their operating systems are regularly updated.
Apple's Security Reputation at Risk
Apple devices have long been seen as secure and easy to manage. Because of these benefits, many businesses and some government agencies prefer Apple products. However, Lookout Incorporated's findings indicate that this perception could change soon. Their latest Mobile Threat Report reveals that during the first three quarters of 2024, 19% of Apple devices employed in corporate environments were targeted by phishing attacks.
Understanding Phishing Threats
Phishing refers to a type of cybercrime where attackers try to appropriate money, sensitive information, or place malware on a target's device. Such attacks often come disguised as authentic messages or alerts from trusted sources, like a business or a friend.
Rising Risks for Android Users
In the same period, 10.9% of Android smartphones experienced phishing attacks. The Mobile Threat Report also uncovered a concerning 17% rise in credential theft and phishing aimed at businesses since the last quarter, along with a staggering 32% increase in the identification of malicious apps. This information was collected from an analysis of over 220 million devices, 360 million applications, and billions of web resources.
A significant issue lies in the use of outdated operating systems that do not receive the latest security updates, leaving them with exploitable vulnerabilities. In some instances, users neglect to enable device locks, which adds another layer of risk.
Accountability of Tech Companies
Lookout also points fingers at technology firms. There can be long delays between when vulnerabilities are identified and when they are resolved, providing potential attackers with opportunities to infiltrate devices. Thus, businesses are urged to apply updates as soon as they are released.
In conclusion, optimal protection can only be achieved when IT systems are kept current and fortified with extensive security measures.
Source: Link