Trusted

Study Reveals that Hackers Prefer Targeting iPhones and Instagram

2 mins
By
Updated by
Join our Trading Community on Telegram
Hacker behavior is often unpredictable, with their goals changing all the time, but a recent study revealed that iPhones and Instagram accounts may be preferred targets.
According to a recent study by a company from the UK, called Case24.com, it would appear that some patterns in hacking attacks were recently spotted by security researchers. The study shows that hackers are more likely to target iPhones than other devices. At the same time, they would rather target Instagram accounts.

Google Search Data Comes in Handy for iPhone Hacks

Researchers used Google’s search data for the US and the UK, among other information. After studying the UK searches, researchers concluded that some 10,040 users were trying to find information on how to hack iPhones. Meanwhile, those interested in how to hack Samsung numbered only 700. There were also searches on how to hack other smartphone brands, including Nokia, Huawei, Sony, and more, although Apple’s iPhone sits at the very top of the list. These findings mirror the one found from the US region, where hacking an iPhone was searched as many as 48,010 times. In comparison, only 3,100 searches requested information on how to hack Samsung devices. Researchers found this data quite astonishing, although they did not reveal risk factors and potential flaws that would actually allow someone to hack iPhones. iPhone Instagram

Instagram Is the Most Targeted App

The next goal was to see the situation regarding app hacking, rather than device hacking. By using the same sources, researchers concluded that the UK users are extremely interested in how to hack Instagram accounts, with over 12,310 searches. The second place went to Snapchat, with would-be hackers making over 7,380 searches, followed by WhatsApp, with 7,100 searches. In the US, around 66,960 Americans searched ‘how to hack Instagram,’ clearly showing that the UK results are, once again, mirrored across the ocean. Of course, determining which apps and devices are in the most immediate danger according to Google searches is not the most reliable method of uncovering the true danger. However, the results are still rather convincing, considering that both the iPhone and Instagram are often targeted and regularly updated.
Images are courtesy of Shutterstock, Twitter, Pixabay.
Top crypto projects in the US | November 2024
Coinbase Coinbase Explore
Coinrule Coinrule Explore
Uphold Uphold Explore
3Commas 3Commas Explore
Chain GPT Chain GPT Explore
Top crypto projects in the US | November 2024
Coinbase Coinbase Explore
Coinrule Coinrule Explore
Uphold Uphold Explore
3Commas 3Commas Explore
Chain GPT Chain GPT Explore
Top crypto projects in the US | November 2024

Disclaimer

In adherence to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news article aims to provide accurate, timely information. However, readers are advised to verify facts independently and consult with a professional before making any decisions based on this content. Please note that our Terms and ConditionsPrivacy Policy, and Disclaimers have been updated.

Sponsored
Sponsored