HomeRisk ManagementsHalf of Mobile Devices Use Outdated Operating Systems

Half of Mobile Devices Use Outdated Operating Systems

Published on

spot_img

Research Reveals Alarming Cyber Vulnerabilities in Mobile Devices

A significant new study indicates that nearly half of all mobile devices are currently operating on outdated operating systems, a situation that leaves them exceptionally exposed to potential cyber-attacks. This revelation emerges from the 2025 Global Mobile Threat Report published by Zimperium, which underscores the increasing frequency of mobile-targeted assaults and app vulnerabilities. As smartphones become integral to corporate operations, malicious actors are seizing this opportunity to exploit security weaknesses.

The report highlights a troubling escalation in phishing tactics, particularly through text messages, a method known as “smishing.” Recent data indicates that these SMS phishing attacks now constitute 69.3% of all mobile phishing incidents. Alongside this rise, vishing, which refers to voice phishing, and smishing have seen increases of 28% and 22% respectively.

Darren Guccione, the CEO of Keeper Security, commented on the findings, stating, “The rise of sophisticated and large-scale mobile phishing campaigns reflects the evolving threat landscape.” He emphasized that “cybercriminals are leveraging phishing pages that appear official to exploit users’ trust,” thereby manipulating individuals into divulging sensitive information.

The Zimperium report delineates several critical aspects that impact mobile device security. Approximately 50% of mobile devices are still using outdated operating systems, which significantly increases their vulnerability. Additionally, over 25% of these devices are unable to upgrade to the latest OS, further compounding the risk. The research also outlines alarming statistics on app security: more than 60% of iOS applications and 34% of Android applications lack fundamental code protection. Moreover, nearly 60% of iOS apps and 43% of Android apps are susceptible to personally identifiable information (PII) leakage.

Malware continues to serve as the primary tool for attackers, witnessing a staggering 50% year-over-year increase in the usage of Trojans. Research has revealed new malware families, notably including Vultur, DroidBot, Errorfather, and BlankBot. The implications of these findings are profound, as they highlight an evolving landscape of threats in which cybercriminals are continuously innovating their strategies and tools.

Persistent App Vulnerabilities Pose Ongoing Threats

Despite growing awareness of mobile threats, vulnerabilities related to mobile applications continue to represent a significant concern. Particularly concerning are apps downloaded from sources outside of official app stores, which place both users and organizations at considerable risk of encountering Trojans and experiencing data breaches.

Jason Soroko, a senior fellow at Sectigo, noted that “sideloading bypasses the official app stores’ rigorous vetting processes,” resulting in devices being left exposed to various malicious software and unauthorized code. It has become increasingly evident that even applications developed internally by organizations are not immune to severe security risks.

Eric Schwake, the director of cybersecurity strategy at Salt Security, explained, “Threat actors find mobile apps appealing because they often manage sensitive user data.” This accessibility to sensitive information makes mobile applications a prime target for cybercriminals. Several design flaws, insecure APIs, and inadequate security measures have been identified as significant factors contributing to the ongoing vulnerabilities in mobile app security.

In light of these potentially dangerous trends, experts strongly urge individuals and organizations to adopt rigorous and proactive measures to safeguard their digital assets. Recommended strategies include the implementation of real-time mobile threat detection systems, adherence to regular updates and patch management, and the adoption of comprehensive security frameworks such as zero-trust models.

As mobile devices increasingly entwine themselves in the fabric of daily business operations, the imperative to secure these tools against the evolving landscape of cyber threats has never been more critical. Without appropriate measures in place, individuals and organizations alike remain at heightened risk, potentially exposing sensitive data and incurring significant financial and reputational damage. In an era where mobile technology and cybercriminal ingenuity appear to be advancing hand in hand, the urgent call for enhanced security and awareness cannot be overstated.

Source link

Latest articles

Mature But Vulnerable: Pharmaceutical Sector’s Cyber Reality

In a digital world where every click can open a door for attackers,...

The Hidden Lag Killing Your SIEM Efficiency

 If your security tools feel slower than they should, you’re not imagining it....

AI-fueled cybercrime may outpace traditional defenses, Check Point warns

 As AI reshapes industries, it has also erased the lines between truth and...

When Your “Security” Plugin is the Hacker

Source: The Hacker NewsImagine installing a plugin that promises to protect your WordPress...

More like this

Mature But Vulnerable: Pharmaceutical Sector’s Cyber Reality

In a digital world where every click can open a door for attackers,...

The Hidden Lag Killing Your SIEM Efficiency

 If your security tools feel slower than they should, you’re not imagining it....

AI-fueled cybercrime may outpace traditional defenses, Check Point warns

 As AI reshapes industries, it has also erased the lines between truth and...