Cybersecurity News

2020 To Be Year of Mobile Sneak Attacks: McAfee

New McAfee report finds hackers using hidden mobile apps and unique distribution methods to target consumers.

McAfee’s Mobile Threat Report 2020, found that hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target consumers. Last year, hackers targeted consumers with a wide variety of methods, from backdoors to mining cryptocurrencies. Based on new research, McAfee has uncovered that hackers have expanded the ways of hiding their attacks, making them increasingly difficult to identify and remove, which makes it seem like 2020 will be the year of mobile sneak attacks.

McAfee found that hidden apps are the most active mobile threat facing consumers, generating nearly 50% of all malicious activities in 2019- a 30% increase from 2018. Hackers continue to target consumers through channels that they spend the most time on- their devices, as the average person globally is expected to own 15 connected devices by 2030. Hidden apps take advantage of unsuspecting consumers in multiple ways, including taking advantage of consumers using third-party login services or serving unwanted ads.

“Mobile devices hold the key to our lives – both corporate and personal. Unfortunately, they are also amongst the easiest attack vectors for cybercriminals because, consumer awareness levels towards security of their devices and apps is low. Hidden apps have emerged as the most active mobile threat category and it’s highly advisable that consumers stay vigilant with regards to where they download applications from, what they click and also ensure they use the right security software on their devices, to enable detection and protection of their digital lives.” said Venkat Krishnapur, Vice-President of Engineering and Managing Director, McAfee India.

The McAfee Mobile Threat Report 2020 highlights the following mobile trends: Hackers use gaming popularity to spoof consumers; New mobile malware uses third-party sign-on to cheat app ranking systems; Unique approach to steal sensitive data through legitimate transit app. 

Related posts

IIT Bombay partners with ABB India to set up state-of-the-art electrical machines and drives lab

enterpriseitworld

Facial Recognition: Building a Robust Smart Transportation Ecosystem

enterpriseitworld

Tenable Cloud Risk Report Sounds the Alarm on Toxic Cloud Exposures

enterpriseitworld
x