News

Published on December 28th, 2019 📆 | 2081 Views ⚑

0

the leader in terms of the number oF “how to hack?” queries


https://www.ispeech.org/text.to.speech

Sometimes we think that a high-end smartphone offers better security than its cheaper counterparts, although this is not completely necessary. According to web application security specialists, in collaboration with the manufacturer of phone cases Case24.com, an iPhone is nearly 200 times more prone to hacking than any other smart device.

The research guys found that nearly 11,000 users a month enter into conventional Internet browsers queries such as: “hack an iPhone”, “how to hack an iPhone”, “hack iPhone tutorial”, and other similar searches. In a distant second place is located Samsung, with less than a thousand similar searches a month.

Other searches recorded to a lesser extent relate
to companies such as Sony, Nokia or LG; according to web application security
specialists, Internet searches related to the hacking of devices of these
manufacturers do not exceed 100 per month.

Regarding the search for information about the
hacking of mobile applications, it is no surprise that the main objective is
social media platforms. According to the study, every month about 13,000
Britons search for “how to hack Instagram profile”, while the second
place in this section corresponds to Snapchat; “It’s almost 20 times more
likely that someone will try to hack an Instagram profile than a Netflix
account,” say web application security experts.





It is important to mention that this analysis
only refers to online queries related to the interest of some users for hacking
a device or online account, at no time does it focus on exposing information
related to exploits or vulnerabilities that would allow these malicious
actions.

The study is limited to the collection of data
from mobile phone users in the UK and some members of the cybersecurity
community consider that the approach and methods used by the specialists who
developed it are not really reliable. However, web application security experts
from the International Institute of Cyber Security (IICS) consider that it is
not a mistake to claim that the iPhone is one of the most frequent targets of
cyberattacks, so Apple had to take a much approach more proactive for
preventing multiple security threats.  



Source link

Tagged with:



Comments are closed.