YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Porn Returns to Top of Mobile Cyberattacks List

Posted On 09 Nov 2015
By : Marty O'Brien

MobileVirusSUNNYVALE, Calif. – After dropping to number two in 2014, pornography has returned as the number one threat vector for malware infection on mobile devices.

And it’s not just back on top. The threat in 2015 is more than twice as large as that noted last year, according to cybersecurity firm Blue Coat Systems Inc., jumping from 16.55 percent in 2014 to more than 36 percent this year — meaning 36 percent of links to malicious sites are found on adult content sites.

The data and analysis are contained in Blue Coat’s 2015 State of Mobile Malware Report, which notes the three top types of malware are ransomware, potentially unwanted software and information leakage.

According to the report, mobile ransomware has grown dramatically over the past year. While some varieties that run on Android devices cause little damage beyond convincing victims to pay the cyber hostage-taker, many have adopted more sophisticated approaches common to ransomware in the Windows environment.

“With the increased performance capabilities of modern smartphones, it was only a matter of time before more advanced cryptographic ransomware, such as SimpleLocker, started showing up on mobile devices,” said Dr. Hugh Thompson, chief technology officer and senior vice president at Blue Coat. “These threats render music files, photographs, videos and other document types unreadable while typically demanding an untraceable form of payment such as bitcoin and employing a strict time limit for payment before the files become permanently inaccessible to the owner.”

Potentially unwanted software generally exhibits behavior typical of “adware” or “spyware”: spying on users’ on-line activity and personal data or serving extra ads. Blue Coat researchers have seen a major shift in the volume of such malware in the traditional and mobile spaces as the number of junk mobile apps hosted on sites the researchers classify in this category has risen steadily.

This type of mobile app, notable for its dubious utility, frequently finds its way onto a mobile device through the use of deceptive advertising or other social engineering attacks designed to deceive the victim into installing the unwanted program.

Most people are unaware that apps on their mobile device may be watching them and reporting to a cyber puppet master on a 24/7/365 basis, Thompson said. Called “information leakage,” the data theft usually comprises an unnoticeable drip of the version of a phone’s operating system, the manufacturer, the specific app or browser being used and similar information. Typically, phones do not include system tools allowing users to see what data is leaving their devices. Leaky data is often openly revealed in the “User Agent” string.

As for the future?

Mobile payment systems are set to grow, and services including contactless payment methods will incorporate additional security features such as biometrics or two-factor authentication, according to Blue Coat. In addition, because manufacturers update mobile OSes infrequently, the market for third-party security solutions that can support both traditional PC and mobile platforms almost certainly will expand. Mobile carriers and handset makers are already working on plans to fast-track critical OTA updates to vulnerable devices, but the work is slow and it may be some time before this segment of the mobile market matures.

 

About the Author
Raised in the Appalachian Mountains of Kentucky, Marty O'Brien was the first of the O'Brien clan to obtain a college degree. A former sports journalist, O'Brien got a peek at the inner workings of the adult entertainment industry while on an assignment to cover the Los Angeles Lakers. He joined the YNOT editorial team in late 2010 and now specializes in technology , business news and ogling starlets.
  • google-share
Previous Story

Vibratex Redesigns, Launches Sexier Website

Next Story

Oxballs Now Available Down Under

Related Posts

Scam Targeting Freelancers a Reminder: Handle Email with Care

Posted On 24 Sep 2018
, By GeneZorkin

New Phishing Scam Uses Prior Passwords, Porn Threat to Drive Fear

Posted On 23 Jul 2018
, By GeneZorkin

New Reports: Porn’s Role In Cybersecurity Threats Exaggerated

Posted On 13 Jun 2018
, By GeneZorkin

One Comment

  1. Pingback: Payment Providers Porn Returns to Top of Mobile Cyberattacks List - Payment Providers

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • WMA
    News & Resources
  • AdultLabs
    Adult Content Brokers
  • Panda Brazil
    Adult Content Brokers
  • Premiere Listing

    YNOT Mail

    More Details

RECENT

POPULAR

COMMENTS

DD White is Back With 25 Bangers

Posted On 18 Jun 2025

Ameena Green Shines at Dream Con 2025

Posted On 18 Jun 2025

Richard Mann And Evil Angel Heat Up The Summer With Frecklemonade

Posted On 18 Jun 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy