Mobility, IoT Boost Enterprise Security Risks

Mobile malware Mobility, IoT Boost Enterprise Security Risks Channel providers looking to tap opportunities in security should bolster their offerings, particularly for managing mobile devices. Number of Android Threats Ease Threats for the Android platform decreased 21% from 1,526,756 in Q2 to 1,205,487 in Q3. New Android Families Quick Heal Threat Research Labs found 220 […]

Written By: Gina Roos
Nov 23, 2015
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Mobile malware

1 - Mobility, IoT Boost Enterprise Security RisksMobility, IoT Boost Enterprise Security Risks

Channel providers looking to tap opportunities in security should bolster their offerings, particularly for managing mobile devices.

2 - Number of Android Threats EaseNumber of Android Threats Ease

Threats for the Android platform decreased 21% from 1,526,756 in Q2 to 1,205,487 in Q3.

3 - New Android FamiliesNew Android Families

Quick Heal Threat Research Labs found 220 new families of Android malware in Q3, up from 170 in Q2. These families include several strains of PUAs and adware.

4 - Variants of Exiting Android ThreatsVariants of Exiting Android Threats

Quick Heal Labs found 148 new variants of existing Android malware families in Q3, down from 232 in Q2, which means more users are adopting Android security measures.

5 - Malware GrowsMalware Grows

For 2015 so far, the number of new Android malware families in 2015 crossed the 500 mark, and new variants of existing malware families are close to 600.

6 - iOS Won't Be ImmuneiOS Won’t Be Immune

The report does not break out data on iOS vulnerability. However, the report stated: “It is expected that Android malware will soon be altered to affect iOS users as well, and jailbroken iOS devices will be the first wave of targets for these attacks.”

7 - Out-of-Control MalwareOut-of-Control Malware

The detection count for Windows malware in Q3 rose twofold, approaching 400 million samples, indicating the prevalence of Windows malware globally.

8 - Trojans Top Malware ThreatsTrojans Top Malware Threats

Trojans (34%) were the most common type of malware affecting the Windows platform in Q3, followed by infectors (25%), worms (20%) and potentially unwanted applications, or PUAs (11%).

9 - Malicious SpamMalicious Spam

The percentage of malicious spam emails in Q3 was the highest in 2015, increasing to 36% from 34% in Q2 and 30% in Q1.

10 - Targeted AttacksTargeted Attacks

The top targeted industries in Q3 were businesses (53%), computers and technology (16%), travel (6%), finance (5%), and health & medicine (5%).

11 - Bypassing CAPTCHABypassing CAPTCHA

Applications continue to pose new threats through CAPTCHA-bypassing malware from the Google Play store and fake malicious games.

12 - Adware RulesAdware Rules

Adware is still the leading source of malware on Android devices. Adware accounted for 60% of the total samples received in Q3, followed by PUA (25%) and malware (15%).

Recommended for you...

Video: FNG on Seeing The Invisible With Wireless Surveys

Greg Upton of UK-based FNG describes the demand for wireless survey offerings from his business.

Katie Bavoso
Mar 27, 2024
How Qualcomm and Lenovo Plan to Solve Enterprises’ Apple Problem

Lenovo and Qualcomm are building laptops, tablets and smartphones to solve enterprises' reliance on a single vendor - Apple.

Rob Enderle
Dec 3, 2021
How The Semiconductor Shortage Happened – And When It Will Recover

The chip shortage has constrained manufacturing and caused product delays. Here's what to expect going forward. This week Huawei sponsored a panel of

Rob Enderle
May 20, 2021
How Are Endpoint Supply Chains Changing in 2021?

What's affecting the Endpoint Supply Chain for Channel Partners? And, why is Lenovo adding 5G to laptops? Learn more.

Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.