Mobile phishing attacks are on the rise

Mobile phishing attacks are on the rise

Share post

According to the report “The Global State of Mobile Phishing”, more than half of mobile work devices were the target of a mobile phishing attack in 2022. This led to high costs for companies.

While remote employment has become a new reality for companies around the world, many are still struggling to secure the new mobile environments.

2022 highest number of mobile phishing attacks

According to “The Global State of Mobile Phishing” report published by Lookout, 2022 has already seen the highest rate of phishing attacks on mobile devices to date, with more than 50 percent of these personal work assets having already been exposed to a mobile phishing attack. Lookout estimates the potential financial loss of a mobile phishing attack to be nearly $5.000 million per year for a company with 4 employees.

Lookout, the data-focused cloud security company, has announced the availability of Mobile Endpoint Security to CrowdStrike channel partners and customers in its marketplace. As part of CrowdStrike's globally recognized ecosystem, compatible with special partner offerings, Lookout will be the first mobile threat defense solution in the CrowdStrike Marketplace.

Protection against mobile phishing attacks

Lookout Mobile Endpoint Security provides visibility into mobile threats and state-sponsored spyware while protecting mobile device users from phishing and credential theft. The platform analyzes telemetry data from more than 215 million devices, 269 million apps, and millions of web destinations to uncover hundreds of phishing domains every day.

Daniel Bernard, Chief Business Officer at CrowdStrike, said: “With CrowdStrike's Marketplace, we are making it easy for our customers to gain greater flexibility and choice by integrating best-of-breed security products into the CrowdStrike Falcon platform. Lookout Mobile Endpoint Security is a special example of an innovative security solution from a partner: it addresses the mission-critical security challenges that companies increasingly face as employees connect their mobile devices to corporate networks.”

More at


About Lookout

Lookout co-founders John Hering, Kevin Mahaffey, and James Burgess came together in 2007 with the goal of protecting people from the security and privacy risks posed by an increasingly connected world. Even before smartphones were in everyone's pocket, they realized that mobility would have a profound impact on the way we work and live.


Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more