April 23, 2015 By Shane Schick 2 min read

Most people would probably agree getting struck by lightning is worse than downloading mobile malware, but security researchers say the statistical likelihood of either happening is about the same.

Unveiled at the recent RSA Conference in San Francisco, Damballa Inc. presented detailed results from a two-year study of more than 2 million unique hosts contacted by mobile devices across North America. The research concludes that mobile malware was contacting only 0.0077 percent of devices, based on a blacklist it had compiled. That means the average mobile user has only a 0.01 percent chance of being hit by a cybercriminal attack on his or her smartphone or tablet.

Damballa isn’t the only firm downplaying the extent of mobile malware issues. Verizon recently published a report of its own that said much of the same thing and even questioned the way organizations calculate the true cost of stolen data.

Besides suggesting many threats to mobile users may be wildly overblown, there were other surprises in Damballa’s research. As CSO Online noted, the report showed mobile malware infection rates were twice as high two years ago, the last time the company conducted a similar study. While that could be a credit to app stores that fend off the apps that pose the biggest risks, it could also be the increased sophistication of software tools to fight off cybercriminals.

A story on TechTarget pointed out that there is a direct relationship between mobile malware and the propensity for users to jailbreak phones in a given region. Unlocking devices can provide smartphone users the possibility of more choices in terms of apps, but it also means cybercriminals may have an easier way to target their potential victims.

Naturally, the statistics from Damballa aren’t intended to suggest chief information security officers and their teams should ignore the various Trojans, ransomware and other similar threats; when cybercriminals strike, the results can be disastrous. Ultimately, the numbers could mean IT departments will spend less time fending off cybercriminals directly. Rather, they may concentrate their efforts on educating their co-workers about phishing schemes and other techniques that might get them into trouble. It’s a matter of not leaving yourself exposed and vulnerable to unexpected danger — not unlike taking shelter during a thunderstorm to avoid lightning.

Image Source: iStock

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today