Which Australian Cities Are Most Attacked By Malware?

Which Australian Cities Are Most Attacked By Malware?

New research from online security firm F-Secure has revealed the Australian CBDs that are most susceptible to Android-based malware attacks. Statistically, you could be twice as likely to encounter a threat depending on the capital city you reside in. Read on to see which major cities came out on top.

Brisbane picture from Shutterstock

F-Secure based its findings on all of the malware it had detected at the local level. According to its data, Melbourne CBD ranks as the number one area in Australia for malware threats, with nearly 20 per cent of all identified threats occurring in this region. The rest of the top five was rounded out by Brisbane (14 per cent), Perth (11 per cent) and Sydney (9 per cent).

The most prolific threats come in the form of ransomware which can lock access to a device until the user pays a ransom and dodgy variant apps that introduce privacy or security risks to the user’s phone while charging a fee for a program that can normally be accessed for free.

According to F-Secure’s security advisor Su Gim Goh, the city of Melbourne came out on top because its residents “probably” download more apps than other Australians. It’s worth noting that this appears to be pure speculation on Goh’s part with no supporting evidence given.

F-Secure warns that the leadup to the holiday period tends to be rife with increased malware attacks and online fraud. The company is urging Australian consumers to be extra wary, particularly when it comes to using WiFi connection with their phone.

“Unsecured Wi-Fi access points are excellent sources of personal information such as credit card numbers and email logins for thieves,” Adam Smith, F-Secure’s country manager for Australia and New Zealand explained. “This type of information can potentially be passed over the Wi-Fi in plain text and quickly utilised for potential criminal gain.”

To reduce the risk of getting hacked, F-Secure recommends locking your device, setting up message barring, carefully scrutinising permission requests and only downloading apps from trusted sources.