Apple's iPhone leads the pack of mo, according to nCircle survey at Black Hat

August 4, 2009

2 Min Read

PRESS RELEASE

SAN FRANCISCO, CA - July 31, 2009- iPhones are the most vulnerable mobile devices to attacks from hackers, according to a survey of security professionals attending the Black Hat USA conference held this week in Las Vegas.

The survey was conducted by nCircle, the leading provider of agentless security and compliance audit solutions.

The full survey results are:

What mobile devices will be most vulnerable to attack for the remainder of 2009?

-Google / Android Phone (13) 14% -iPhone (55) 56% -Blackberry (7) 8% -Nokia OS (5) 5% -Other (14) 15%

According to Andrew Storms of nCircle, "The iPhone is really a security triple threat. Its enormous commercial success and huge number of users -- and the exponentially increasing number of available apps -- mean more and more information is being stored on the phone. Adding to the threat, security researchers know a lot about the OS, even though Apple is trying to keep the system closed.

"Unfortunately, it looks like the security problems with iPhone will continue to grow until Apple makes security a higher priority," continued Storms. "If there is a silver lining for iPhone users, it's that all of the security research attention it is getting could eventually turn the iPhone into one of the most secure mobile platforms."

About nCircle nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,000 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.

nCircle is a registered trademark of nCircle Network Security, Inc. All other registered or unregistered trademarks are the sole property of their respective owners.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights