Apple's iPhone leads the pack of mo, according to nCircle survey at Black Hat
August 4, 2009
PRESS RELEASE
SAN FRANCISCO, CA - July 31, 2009- iPhones are the most vulnerable mobile devices to attacks from hackers, according to a survey of security professionals attending the Black Hat USA conference held this week in Las Vegas.
The survey was conducted by nCircle, the leading provider of agentless security and compliance audit solutions.
The full survey results are:
What mobile devices will be most vulnerable to attack for the remainder of 2009?
-Google / Android Phone (13) 14% -iPhone (55) 56% -Blackberry (7) 8% -Nokia OS (5) 5% -Other (14) 15%
According to Andrew Storms of nCircle, "The iPhone is really a security triple threat. Its enormous commercial success and huge number of users -- and the exponentially increasing number of available apps -- mean more and more information is being stored on the phone. Adding to the threat, security researchers know a lot about the OS, even though Apple is trying to keep the system closed.
"Unfortunately, it looks like the security problems with iPhone will continue to grow until Apple makes security a higher priority," continued Storms. "If there is a silver lining for iPhone users, it's that all of the security research attention it is getting could eventually turn the iPhone into one of the most secure mobile platforms."
About nCircle nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,000 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.
nCircle is a registered trademark of nCircle Network Security, Inc. All other registered or unregistered trademarks are the sole property of their respective owners.
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024