Mobile phishing attacks hit an all time high so how can you stay safe

Mobile phishing attacks hit an all time high so how can you stay safe

According to new research by mobile security firm Lookout, mobile phishing attacks have risen by 85% every year since 2011!

exc-5c41fe2470a6ad9e74ed35a0

According to new research by mobile security firm Lookout, mobile phishing attacks have risen by 85% every year since 2011!

On average a user clicks on a mobile phishing link 6 times a year, which could be devastating especially as many people control their comp lete life including finances and household tech via their mobile phone handsets.

Everyone is so aware of cybersecurity risks when they are on a laptop or desktop computer but it seems we are all more relaxed to such potential i ssues when we are on our mobile phones.

The new report highlights the fact that many cybercriminals are successfully circumventing existi ng phishing protections to target the mobile devices.

This means that they are able to expose sensitive data and personal information which might otherwise be safe on other devices.

“Most corporations are protected fr om email-based phishing attacks through traditional firewalls, secure email gateways, and endpoint protection. In addition, people today are getting better at identifying phishing attacks. Mobile, however, has made identifying and blocki ng phishing attacks considerably more difficult for both individuals and existing security technologies,” said Lookout.

They added: “In spite of being protected by traditional phishing protection and education, 56% of Lookout u sers received and tapped a phishing URL on their mobile device between 2011–2016.

“Fortunately, in these cases, the attack was thwarted by Lookout. Unfortunately, though, the rate at which Lookout users are receiving and tappi ng on phishing URLs on their mobile devices has grown by an average of 85% YoY since 2011.”

It’s not only emails though that can be the entry point of a phishing attack, with over 25% of employees clicking on a link in an SMS message from a phone number spoofed to look like one in their area, according to Lookout research.

And this is all before we talk about accessing unsecured data networks and wifi – so how can you and your staff say safe on your mobile phones?

Start with a passcode

This might sound like the most obvious thing ever but you would be amazed how many people still don’t use the most basic of security measures.

If you have cer tain handsets then using your fingerprint is the best option as this stops anyone seeing you access your phone using the code and then stealing the handset.

If you prefer a passcode or password take time to think of something w hich is more difficult to hack – so we’re not talking about your date of birth or the last six digits of your phone number!

Encrypt your storage

Most modern devices have the ability to encrypt phone storage . Some of them do it even by default seamlessly without the user even noticing.

By encrypting the storage, if your device is lost or stolen, even the more advanced cyber criminals will have little to no chance of getting to your data – this is advice many celebrities, who have had their ‘personal’ photos hacked, should heed.

Set up remote wipe

Most modern devices support the ability to remotely wipe devices if they do fall into the wrong hands.

By using iCloud on the iPhone or Google Sync on your Android device you can wipe all data remotely meaning everything can still remain largely safe and secure.

All devices should also be set to erase all of the device’s data automatically after a set number of password attempts, as this will discourage hackers.

Antivirus software

A mobile phone is now effectively as a small computer, it can do everything your laptop can so should be treated as such with the installation of anti-virus software as standard.

This will protect the handsets from any malware which can so often be embedded in apps, which are readily available in app stores.

Education

Again, although all of this may seem obvious some people are still oblivious to potential dangers so some simple education and rules, especially where work mobiles are concerned could prevent any future problems.

One simple thing to introduce is stopping people clicking any link on any email or text message.

You should also be suspicious of offers you are asked to download – as often they really are too good to be true and can contain a virus.

Applications should only be downloaded from the official App Store, rather than from third-party sources so you know they are safe.

Manage connections

All automatic connections to open wifi should be disabled on the handsets so you only connect to trusted networks.

If you do need to access Wifi on an untrusted network, then using a Virtual Private Network (VPN) is the best option.

  • Recent Articles
Author Details
Founder & CEO at Hedgehog Security

Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.

We would like to keep you informed about our services. Please tick the options below to receive occasional updates via

  • penetration testing steps
    Peter talks to FindMyUkCasino
  • Malware
    SB Tech Breach

    Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims.  GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.

  • Privacy
    Howto VPn

    In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.

  • WhatsApp
    How To Whatsapp Safely

    WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.

  • Morrisons Breach Update

    The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.

  • Remote Working Considerations

    With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets

  • Securing Zoom
    How To: Securing Zoom

    In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.

  • Software Security
    Dell EMC iDRAC memory corruption Vulnerability

    A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.

  • Hiscox Sues for Failing to Disclose Data Breach

    On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.

  • Software Security
    Privilege escalation on Nginx Controller up to 3.1.x Controller API

    A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest
Scroll to Top