iPhone – the leader in terms of the number of search queries “how to hack?”

Sometimes we think that a high-end smartphone offers better security than its cheaper counterparts, although this is not completely necessary. According to web application security specialists, in collaboration with the manufacturer of phone cases Case24.com, an iPhone is nearly 200 times more prone to hacking than any other smart device.

The research guys found that nearly 11,000 users a month enter into conventional Internet browsers queries such as: “hack an iPhone”, “how to hack an iPhone”, “hack iPhone tutorial”, and other similar searches. In a distant second place is located Samsung, with less than a thousand similar searches a month.

Other searches recorded to a lesser extent relate to companies such as Sony, Nokia or LG; according to web application security specialists, Internet searches related to the hacking of devices of these manufacturers do not exceed 100 per month.

Regarding the search for information about the hacking of mobile applications, it is no surprise that the main objective is social media platforms. According to the study, every month about 13,000 Britons search for “how to hack Instagram profile”, while the second place in this section corresponds to Snapchat; “It’s almost 20 times more likely that someone will try to hack an Instagram profile than a Netflix account,” say web application security experts.

It is important to mention that this analysis only refers to online queries related to the interest of some users for hacking a device or online account, at no time does it focus on exposing information related to exploits or vulnerabilities that would allow these malicious actions.

The study is limited to the collection of data from mobile phone users in the UK and some members of the cybersecurity community consider that the approach and methods used by the specialists who developed it are not really reliable. However, web application security experts from the International Institute of Cyber Security (IICS) consider that it is not a mistake to claim that the iPhone is one of the most frequent targets of cyberattacks, so Apple had to take a much approach more proactive for preventing multiple security threats.