Overview of Top Mobile Security Threats in 2022
As the amount and frequency of mobile threats grow, organizations require a comprehensive solution to protect against these security threats when users are not using the device itself.
A top risk for mobile devices is malware, which is constantly evolving. Mobile malware is most concerned with stealing account credentials and encrypting sensitive data. At the other end of the spectrum is physical threat, which can be caused by physical security threats like power outages and theft.
To help you assess your risks, here’s a rundown of the top mobile threats in various categories.
Cyber Crime & Fraud
In the last decade, the amount of cybercrime related to mobile devices has increased exponentially.
According to FICO, cybercrime related to mobile device fraud have reached $12.1 billion in 2013 and are predicted to surpass $18.3 billion in 2015.
In late November of last year, a cybersecurity group published a comprehensive analysis of Android and iOS malware for mobile devices, which identified more than 200,000 malicious apps. In terms of individual threats, Android malware affected 25 million mobile users, while iOS was responsible for 5 million mobile users. The group further found that many of these threats, including keyloggers and adware, aimed to steal personal information.
Fraud and identity theft are also an ongoing problem. According to Verizon, more than 20 percent of U.S. smartphone users have been affected by identity fraud in the last two years.
Malwarebytes reports that in 2008, 3.8 million mobile users were targeted by fraudulent apps, and that number grew to 6.2 million mobile users in 2011. Many of these applications were actually scams that simply looked like legitimate programs. In 2012, mobile users were targeted by over 2 million mobile malware threats.
Social Media Threat
Social media has become an important platform for cybercrime. With access to billions of posts, individuals can be manipulated.
According to a new report, social media is used by criminals to manipulate the online public by inciting conflict between users. These malicious posts sometimes call for violence, as well as political commentary. Individuals can even be manipulated into providing details of personal lives or bank accounts, which if obtained may compromise an individual’s personal safety.
In some cases, cybercriminals target those that live off the grid, especially in mountainous regions. If a region is affected by natural disasters, these criminals utilize these natural disasters as a way to gather information on vulnerable individuals. The same can be true for countries that are under sanctions. The sanctions can be so severe that they prevent citizens from traveling within their country. By gaining access to these individuals, criminals can identify vulnerabilities and create fraudulent emails, Facebook profiles, or even fake accounts.
A recent study showed that one in every eight cybercriminals are involved in this type of criminal activity.
Vulnerable People Threat
Cyber criminals use vulnerable people as bait to find other victims.
The study found that individuals with vulnerabilities are often targeted by criminals. According to the report, there are more than 4,000 known vulnerabilities in software and more than 18 million users who have no security awareness.
The issue is that many times these users trust their computer and allow it to do everything they are asked to do.