• About
  • Subscribe
  • Contact
Wednesday, May 13, 2026
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Devices

Report exposes alarming security gaps in Mac and mobile fleets

by FutureIoT Editors
May 13, 2026

In an era where the lines between corporate and personal data have blurred, a stark new warning has been issued for security leaders. Jamf’s annual Security 360 Report, reveal that vulnerable applications and critically out-of-date operating systems are the top concerns facing organisations today.

The report paints a concerning picture of the modern mobile landscape, where productivity anywhere often comes at a cost. While mobile malware remains relatively uncommon, 95% of assessed applications contained at least one medium-severity vulnerability.

Furthermore, 62% of these apps requested dangerous permissions, with a fifth actively engaging in privacy-impacting behaviours. This massive attack surface is compounded by poor security hygiene, as over half (53%) of organisations have devices running critically out-of-date operating systems.

“Our goal with this research is to spread awareness among security leaders regarding the risks impacting their organisations,” said Michael Covington, VP of portfolio strategy at Jamf. “Avoidance of a holistic, proactive approach to Mac and mobile security places any organisation at unnecessary risk.”

The findings for macOS environments are equally urgent, driven by a 16.4% growth in market share that has made Apple devices a primary target for adversaries. The report notes a significant strategic shift in 2025, with trojans claiming the top spot and representing roughly half of all attacks.

This marks a notable departure from 2024, when infostealers and adware dominated the threat landscape . Overall, trojans, infostealers, adware, and unwanted applications now account for 90% of all Mac attacks.

Compounding this shift in tactics, Jamf Threat Labs added over 26,000 malware samples to their database last year. The data reveals that 44% of devices are experiencing malicious network traffic, and 26% of organisations have been impacted by cryptojacking.

This aligns with independent research highlighting the rise of sophisticated macOS-specific infostealers, which are increasingly capable of bypassing native defences like Gatekeeper to scrape sensitive data directly from endpoints .

Perhaps the most alarming statistic for enterprise IT is the state of basic patch management. The Jamf report found that 58% of organisations are running Macs with critically out-of-date operating systems, and a staggering 73% of evaluated Mac devices contain at least one vulnerable application .

“As Apple devices continue to expand across the enterprise, security solutions should be built specifically for the Apple ecosystem,” Jamf advised, warning against adapting tools from a Windows-first approach.

With 25% of organisations having a user fall victim to a phishing link and advanced persistent threats (APTs) leveraging zero-click attacks, the report is clear that a reactive security posture is no longer viable.

For those responsible for protecting the modern workforce, the message is simple: treat Mac and mobile security with the same rigour as any other critical infrastructure .

Related:  Australia’s Booktopia deploys warehouse robots
Tags: Advanced persistent threatsJamfmobile security

FutureIoT Editors

No Result
View All Result

Recent Posts

  • Report exposes alarming security gaps in Mac and mobile fleets
  • ServiceNow unleashes AI specialists across every business function
  • HPE unveils self-driving networks that slash tickets by 75%
  • Malaysia’s 5G moves indoors as DNB boosts coverage in high-traffic venues
  • Huawei envisions the future of work and wellbeing

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Artificial Intelligence
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Commercial
  • Compliance and Governance
  • Computer, Storage, Networks, Connectivity
  • Construction
  • Consumer
  • Culture and Behaviour|People
  • Customer Engagement
  • Cybersecurity careers
  • Cybersecurity operations
  • Data Protection
  • Devices
  • Digital Transformation
  • Endpoint Security
  • ESG
  • ESG and sustainability
  • Future Workplace
  • FutureCISO
  • FutureCOO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • HR, education and Training
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • People
  • Process
  • Remote work
  • Research and Development
  • Retail and E-commerce
  • Risk Management
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Tactics and Strategies
  • Technology
  • Telecommunications
  • TIBCO
  • Training and awarenes
  • Transportation and Logistics
  • Videos
  • Vulnerabilities and threats
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by Mikhail Nilov from Pexels: https://www.pexels.com/photo/hands-holding-black-controller-9242915/

ServiceNow unleashes AI specialists across every business function

May 11, 2026
HPE Transparency Dashboard

HPE unveils self-driving networks that slash tickets by 75%

May 11, 2026
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe