- iPhone owners are 192 times more at risk to being targeted by hackers than other phone brands.
- Over 48,010 Americans are searching information on how to hack an iPhone monthly.
- Over 10,040 Brits are searching information on how to hack an iPhone monthly.
- Sony, Nokia, LG and Huawei are the safest phones to have.
- Your Instagram account is 24 times more likely to be a target for hackers than your Netflix account.
- 66,960 Americans are interested in finding out how to hack someone’s Instagram account every month.
- Snapchat and WhatsApp accounts are not safe either, with over 35,000 Americans intending to find information on how to hack into these apps every month.
Mobile app hacking is on the rise, and a recent report from the RSA puts smartphones at the top of the list as the main channel for hackers. With that in mind, the experts with an interest in mobile technology from Case24 sought to investigate which apps are more prone to getting hacked. Simultaneously, Case 24 also had a look at the mobile phone brands that are most likely to be targeted by hackers in the US and UK.
The data was gathered by analysing monthly Google search volumes to see how many Americans and Brits are looking to find information on how to hack different apps or phone brands.
You are 192 times more at risk to get hacked if you have THIS phone
When investigating the number of times people searched how to hack different phone brands, the results show a whopping difference between the brand in first place and the other brands. In fact, the results show the following for US:
|Most hacked phone brands (US)||Total search volume|
If you are an iPhone owner, then you are approximately 192 times more likely to have your phone hacked than if you were a Huawei owner.
In second place are Samsung owners, with 3,100 Americans monthly searching how to hack into their phones. LG is third with 670 searches/month, while Sony, Nokia and Huawei were the phones hackers are least interested in, with under 500 searches/month each.
The date for UK shows the following:
|Most hacked phone brands (UK)||Total search volume|
If you are an iPhone owner, then you are 167 times more at risk to have your phone hacked than if you were a Sony owner.
In second place are Samsung owners, with 700 Brits monthly searching how to hack into their phones. Huawei is third with 200 searches/month, while LG, Nokia and Sony were the phones hackers are least interested in, with under 100 searches/month each.
What apps are most at risk of being hacked in the US?
Just like with phone brands, some apps are more prone to being hacked than others. In fact, your Instagram account is approximately 24 times more at risk of being hacked than your Netflix account. The results show that a shocking 66,960 Americans are interested in finding out how to hack someone’s Instagram account every month. Your Snapchat and WhatsApp accounts are not safe either, with over 35,000 Americans intending to find information on how to hack into these apps every month.
|Most hacked apps (US)||Total search volume|
What are the apps most at risk of being hacked in UK?
For Brits, your Instagram account is approximately 17 times more likely to be targeted by hackers than your Netflix account. The results show that a shocking 12,410 Brits are interested in finding out how to hack someone’s Instagram account every month. When it comes to Snapchat and WhatsApp, over 7,000 Brits intend to find information on how to hack into these apps every month.
|Most hacked apps (UK)||Total search volume|
Press release written by Case24
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
- Blog2022.10.12Vulnerability management with Wazuh open source XDR
- Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
- Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
i won the lottery and then people kept on asking me how did i do it, well yea there is a little secrete you all never knew about, i was able to win the 80.000.000 lottery with the help of Dr Dominion lottery winning spell, he gave me number to play and instructed me when to play the lottery and i did as he instructed, my dear friends getting rich is never by luck it’s something we all have to work for, people have been playing same lottery for years now and have never won, we need to be on… Read more »
People cheats due to lack of being contented with their partner or some other reasons. You can’t trust your partner 100% cause you get to know different behavior in a person each day. if you suspect your partner is cheating it’s better to know the truth at once so you can get the peace of mind before it’s too late and you live a life full of regrets. You can’t do this on your own that’s why you need the assistance of an IT expert/PI to monitor and track all the activities of your partner in one swipe. Here is… Read more »
Losing $150k to a cheap online scammers is what anyone would not like to witness, I have been put to depression for someday by an online scammers who made me to believe that I can earn up to $300k USD by investing $150k. I invested all my funds hoping to receive it back in a bigger form. I was totally disappointed and shattered when I was denied the access of withdrawing the profit nor my Capital well all thanks to a recovery hacks who helped me recover my whole funds and the profits. You can contact them now at their… Read more »
They have vast solutions to all online issues contact them through their m ail hackerspytech at g m ail c om Their services includes hacking phone,database,record expungements,spy,and private investigator .Their hacking service is completely anonymous and very easy to use. The most interesting thing about this is, it is very fast and comes with lots of features
I believe this information will be very useful to someone out there. I have been looking for a way to spy on my husband’s phone for quite some time but sadly most of the information available has not been useful. Tried some apps and softwares and none worked. I found this page some days ago but didn’t take it seriously. But the issues that needed to be resolved didn’t go away so I decided to give it a try. I contacted wizardcyberfileshacker at gmail. com for help and they came through. I now have access to my husband’s iPhone and I… Read more »
Hacking a mobile phone is usually something that requires hiring an expert to get it done for you to get your desired result. These mobile hacks actually work fine but most people have problems using it because bulk of the job is done and highly dependent on the hacker. In most cases, the only way you can get it done yourself is if you really know how to hack. Otherwise, your best bet will be to hire a professional hacker, and I recommend HACKERSPYTECH at g mail dot com I have used his services and his is highly professional, he’s… Read more »
Trust me there are a lot of things a good hacker can help you achieve. I never imagined it was nearly possible that someone could move my credit score from 520 to 860 within 5 working days. Trust me I contacted this hacker Albert Vadim reluctantly because I had ran out of options. Within 5 days my life literally changed. I was granted loan, I moved my family to a beautiful house, I am grateful. IF YOU NEED HELP, CONTACT ALBERT VADIM VIA EMAIL: Vadimwebhack AT gmail. com Just a few days back, he helped a friend of mine based… Read more »
Because someone searches the internet for the Anarchist’ Cookbook online does not mean they actually find it and manage to follow the instructions. I frequently try to find something on Ebay and Amazon and come uo empty handed for what I was looking for. Congratulations. You mayly have the most mindnumbingly dumb and horribly thought out article ever. You still have a job after this one?
search for info does not always mean they want to hack it.
Are these metrics only search results? I would imagine many kids in middle/high school are interested in “hacking” but not posing a threat to the general population. Perhaps metrics based on a actual compromised accounts would provide a more accurate picture of vulnerable phone OS / apps. Just a thought.
How does this serve as a credible article when it’s based on word search?