Blog

Hackers Are Increasingly Targeting Mobile Devices

Mar 23, 2022 | Blog

Here’s a statistic you’re not going to like.  Based on research conducted by cybersecurity researchers at Proofpoint, there has been a staggering 500 percent increase in malware attacks against mobile devices during the opening months of 2022. The most significant peak so far this year occurred at the end of February.

Most of the malware that targets mobile devices tends to be relatively benign.  It’s unlikely to encrypt all the files on your phone and demand a ransom. Although there are admittedly some malware strains that do that,  if your phone is infected with malware, it will likely be of the variety that quietly roots through your phone and steals usernames and passwords.

In some cases, you may get infected with a malware strain designed to take screenshots or track your location over time. Again, these are exceptions and not the rule. Even so, malware that steals your account information can be devastating in the longer term. Hackers can use that information to steal your identity, drain your accounts, max out your credit cards, and more.

There are three primary paths hackers use to get malware onto a target Android or iOS device.

The first and the most common is to poison an app and get it placed on either the Apple Store or the Google Play Store.  From there, users will download and install it while completely unaware that they have also installed malware.

SMS texts are another popular avenue of attack, which is why security professionals warn users against tapping links in text messages.  These may be harmless from a dear friend of yours or may have been put there by a hacker pretending to be your friend. When you tap the link, you’re taken to a poisoned website which installs malware in the background.

Finally, there’s email.  By now everyone has heard the dire warnings against clicking on links embedded in email messages or opening file attachments.  This applies whether you’re reading your mail on your phone or your PC.

The bottom line is that you are increasingly a target whether you’re on your PC or your phone.  Be careful.

FBI Program Tasked with Infrastructure Security Compromised

FBI Program Tasked with Infrastructure Security Compromised

The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program's data on the dark web. The breach was initially disclosed by Brian Krebs of Krebs on Security, who claims that the data was for...

Streamline Your Business with the Latest Smart Home Technology

Streamline Your Business with the Latest Smart Home Technology

Are you a business owner looking to get the most out of your Google smart home devices? If so, you're in luck! Google has enabled its Nest products and Android OS with the initial rollout of the Matter smart home standard. This means that businesses now have the...

Data Breach at Sequoia One Exposes Sensitive Customer Information

Data Breach at Sequoia One Exposes Sensitive Customer Information

What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that the company had been hacked. Sequoia One specializes in the management of...

Cisco Reports Critical IP Phone Vulnerability

Cisco Reports Critical IP Phone Vulnerability

As a business owner, it's important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and 8800 Series. This new vulnerability...

Google Chrome Releases Two New Features

Google Chrome Releases Two New Features

Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer's memory. This can be a problem if you're running other resource-intensive tasks and don't want to slow...

Get a Free Consultation

 

Fill out the form below to receive a free consultation and learn how we can make your technology worry-free!

 

Contact Information

  • 39301 Badger Street, Suite 500
    Palm Desert, CA 9221
  • (760) 333-8523
  • info@icn.tech