Skip to main content

Android vs iOS vs Windows: Which suffers most infections? Nokia reveals all

Nokia's 2017 Threat Intelligence Report offers a reminder why it's a good idea to limit app installs to the Google Play Store, even if it's not perfect.

Nokia found that 68 percent of all devices that were infected in the past year were running Android, followed by 28 percent running Windows, and around three percent running iOS.

The figures are based on data collected from Nokia's NetGuard, a security product deployed at mobile network operators and used to monitor network traffic from over 100 million devices across North America, Europe, the Middle East, and Asia Pacific, but not India and China.

Nokia also found the proportion of Android devices that were infected per month was on average 0.94 percent this year.

That's slightly higher than Google's estimate in its 2016 Android security review that 0.71 percent of Android devices had "potentially harmfully applications" installed in Q4 2016. Infections fell to 0.05 percent on devices that only install apps from Google Play.

Nokia says the overall mobile device infection rate was 0.68 percent, while the figure was around 0.2 percent for Windows devices connected to mobile networks, either via a dongle or tethered to a phone.

"The Android platform is the mostly highly targeted by cybercriminals," Kevin McNamee, director of Nokia's Alcatel-Lucent Kindsight Security Labs told ZDNet.

Despite regular reports of trojanized apps slipping past Play Store security checks, McNamee says Google is in fact doing a far better job of keeping it clean than two years ago and now offers better malware protection with Google Play Protect.

"Google has done an excellent job with Google Play Protect and they're really securing the app infrastructure for the Android devices. The main threat vector for Android phones is trojanized apps. In the Android space Google has tried to address this by doing a good job securing Google Play," the Nokia exec said.

The unfortunate thing is that third-party app stores are so common in the Android space that nearly all third-party app stores need to bring security up to Google's level to improve overall Android security."

Nokia estimates the number of Android malware samples has grown by 53 percent over the past year though to July 2017. It now has a collection of 16 million samples.

The most prevalent smartphone malware detected in networks that Nokia monitors all targeted Android. The top was Android adware called Uapush, followed by the Jisut Android lockscreen ransomwarethat Eset researchers found targeting Chinese users.

The Marcher Android banking trojan was the third most commonly seen malware, which is usually hidden in fake versions of popular apps, such as Netflix, that are distributed on non-Google app stores.

As Nokia highlights in the report, Google Play only represents four percent of installs in China where the app market is dominated by local players like Tencent, Qihoo 360, Baidu and Xiaomi.

End-user devices aren't always the victims and can also become attackers. Nokia's report notes the massive WireX Android DDoS bot discovered this yearthat harnessed 150,000 devices to attack content delivery networks. Google, Akamai and security researchers worked together to take the botnet down and remove 300 apps from Google Play.

Nokia's Threat Intelligence Lab also recently investigated an "accidental DDoS" in which a single phone caused problems at an unnamed device manufacturer after suddenly sending 50,000 52-byte TCP packets per second.

Over a one-minute period the phone had sent two million packets to the manufacturer's web server. The disruption suggested the manufacturer was under a DDoS attack, but Nokia discovered the flood of traffic was due to a flaw in a software update.

"It is significant that a software flaw could cause a single smartphone to generate so much traffic," Nokia notes.



Culled: ZDNET

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...