Mobile has revolutionized the tech industry, creating as many new businesses as it has destroyed old ones. In the past decade, a ‘marketing strategy’ has turned into a ‘digital marketing strategy’ before morphing swiftly into a ‘mobile marketing strategy’ and it’s left countless heads spinning.
Oddly, there is one perennial area of concern for the industry that has remained largely untouched by the smartphone: hacking.
According to a recent report from Verizon, mobile devices are seldom used by hackers to commit their nefarious deeds, which is not all that surprising, given the limitations of inputting complex code into small-screen devices. Perhaps more surprising is just how few mobile devices are targeted by hackers.
The Data Breach Investigations Report (DBIR) is Verizon’s annual paper on cybersecurity issues. This year’s DBIR has concluded that “mobile devices are not a preferred vector in data breaches.” In other words: criminals use laptops and desktops to hack into networks.
The report draws on data from tens of millions of mobile devices on Verizon’s own network. It found just 0.03% of tablets and smartphones were infected with serious malware - significantly below the 0.68% rate of infection from unwanted software affecting non-mobile devices.
That’s not all the good news. The few infections that make it through to our phones are generally less serious than the types of spyware and malware affecting our computers. The lion’s share of ‘successful’ mobile viruses were relatively harmless pieces of ‘adnoyance’ software, which are aimed at trying to direct users to purchase security packages and other money-making schemes, or collect personal data. These types of infection are also much easier to spot than the more malicious desktop infractions.
Apple users won’t be surprised to learn that the vast majority of infections were found on open-source Android devices. In fact, most suspicious activity logged on iOS devices were failed ‘hit and hope’ scams aimed at Android users.
This information, while reassuring, is not an excuse for lax security practices. But it does suggest the new model of closed, app-based software - designed to be impervious to hackers - is working, and that can only be a good thing. As more and more online activity is conducted via mobile devices, the tolerance for security breaches will (hopefully) continue to plummet.