According to new research by mobile security firm Lookout, mobile phishing attacks have risen by 85% every year since 2011!
On average a user clicks on a mobile phishing link 6 times a year, which could be devastating especially as many people control their comp lete life including finances and household tech via their mobile phone handsets.
Everyone is so aware of cybersecurity risks when they are on a laptop or desktop computer but it seems we are all more relaxed to such potential i ssues when we are on our mobile phones.
The new report highlights the fact that many cybercriminals are successfully circumventing existi ng phishing protections to target the mobile devices.
This means that they are able to expose sensitive data and personal information which might otherwise be safe on other devices.
“Most corporations are protected fr om email-based phishing attacks through traditional firewalls, secure email gateways, and endpoint protection. In addition, people today are getting better at identifying phishing attacks. Mobile, however, has made identifying and blocki ng phishing attacks considerably more difficult for both individuals and existing security technologies,” said Lookout.
They added: “In spite of being protected by traditional phishing protection and education, 56% of Lookout u sers received and tapped a phishing URL on their mobile device between 2011–2016.
“Fortunately, in these cases, the attack was thwarted by Lookout. Unfortunately, though, the rate at which Lookout users are receiving and tappi ng on phishing URLs on their mobile devices has grown by an average of 85% YoY since 2011.”
It’s not only emails though that can be the entry point of a phishing attack, with over 25% of employees clicking on a link in an SMS message from a phone number spoofed to look like one in their area, according to Lookout research.
And this is all before we talk about accessing unsecured data networks and wifi – so how can you and your staff say safe on your mobile phones?
Start with a passcode
This might sound like the most obvious thing ever but you would be amazed how many people still don’t use the most basic of security measures.
If you have cer tain handsets then using your fingerprint is the best option as this stops anyone seeing you access your phone using the code and then stealing the handset.
If you prefer a passcode or password take time to think of something w hich is more difficult to hack – so we’re not talking about your date of birth or the last six digits of your phone number!
Encrypt your storage
Most modern devices have the ability to encrypt phone storage . Some of them do it even by default seamlessly without the user even noticing.
By encrypting the storage, if your device is lost or stolen, even the more advanced cyber criminals will have little to no chance of getting to your data – this is advice many celebrities, who have had their ‘personal’ photos hacked, should heed.
Set up remote wipe
Most modern devices support the ability to remotely wipe devices if they do fall into the wrong hands.
By using iCloud on the iPhone or Google Sync on your Android device you can wipe all data remotely meaning everything can still remain largely safe and secure.
All devices should also be set to erase all of the device’s data automatically after a set number of password attempts, as this will discourage hackers.
A mobile phone is now effectively as a small computer, it can do everything your laptop can so should be treated as such with the installation of anti-virus software as standard.
This will protect the handsets from any malware which can so often be embedded in apps, which are readily available in app stores.
Again, although all of this may seem obvious some people are still oblivious to potential dangers so some simple education and rules, especially where work mobiles are concerned could prevent any future problems.
One simple thing to introduce is stopping people clicking any link on any email or text message.
You should also be suspicious of offers you are asked to download – as often they really are too good to be true and can contain a virus.
Applications should only be downloaded from the official App Store, rather than from third-party sources so you know they are safe.
All automatic connections to open wifi should be disabled on the handsets so you only connect to trusted networks.
If you do need to access Wifi on an untrusted network, then using a Virtual Private Network (VPN) is the best option.
Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.
Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims. GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.
In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.
WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.
The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.
With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets
In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.
A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.
On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.
A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.