September 23, 2015 By Shane Schick 2 min read

Mobile networks are increasingly becoming an express lane for malware, and Windows devices now represent 80 percent of the hardware that gets infected, recent research revealed.

As part of its regular series of Motive Security Lab reports, Alcatel-Lucent showed that gear running Microsoft’s mobile operating system (OS) accounted for the vast majority of malware spotted this past June. This puts Windows well ahead of Android as a mobile security risk: In fact, devices running the Google-created OS saw a drop in infections during the same period.

Computerworld explained why Microsoft, which has been struggling to gain market share for its Windows Phone and other mobile products, could wind up being a malware magnet. Though iOS and Android devices dominate the market, many people still use Windows-based PCs, connecting to mobile networks either via Wi-Fi or by tethering to cellular equipment or using a dongle. In that sense, Microsoft’s platform still represents one of the biggest targets for cybercriminal activity.

Redmond Magazine pointed out that even if Google helped clamp down against infections on Android devices via its Verified Apps initiative, it’s not necessarily any safer than Windows. In fact, the Alcatel-Lucent report showed there were twice as many Android malware samples in the first half of this year than in 2014. Plus, Microsoft’s recently released Windows 10 includes an array of security features that may help shift the tide of device infections as more people upgrade their laptops and PCs.

In general, mobile networks are becoming far more likely to carry malware than fixed networks, ComputerWeekly noted, with infection rates for the latter dropping in the second quarter of this year. The Alcatel-Lucent report also indicated an increase in spyware that cybercriminals use to monitor smartphone activity, including online transactions and an owner’s location. Of the 25 top infections tracked in the study, this form of malicious code accounted for 10 of the entries.

Adware was another worrying trend cited by the researchers, SecurityWatch reported, with Windows-based BetterSurf offered as an example of how attackers can inject phishing schemes and other threats into everyday computing experiences. The bottom line is, whether you’re using Windows, Android or anything else, mobile malware may never be far away.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today