{"id":45720,"date":"2022-03-15T13:47:01","date_gmt":"2022-03-15T13:47:01","guid":{"rendered":"http:\/\/d29c13e1-a5f3-40c8-8b81-c7342abec079"},"modified":"2022-03-15T13:47:01","modified_gmt":"2022-03-15T13:47:01","slug":"phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/","title":{"rendered":"Phishing attempts against smartphones are on the rise. And those small screens aren&#8217;t helping"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>There&#8217;s been a big rise in <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" target=\"_blank\" rel=\"noopener\">phishing attacks<\/a> designed to specifically target smartphones as cyber criminals look to exploit our increased reliance on these tiny screens.<\/p>\n<p>Previously, <a href=\"https:\/\/www.zdnet.com\/article\/phishing-attacks-watch-out-for-these-telltale-signs-that-youve-been-sent-to-a-phoney-website\/\" target=\"_blank\" rel=\"noopener\">many phishing websites were device agnostic<\/a>, set up to steal usernames and passwords regardless of whether the user was clicking the link from a computer or mobile. But <a href=\"https:\/\/www.zimperium.com\/global-mobile-threat-report\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">cybersecurity researchers at Zimperium<\/a> have analysed hundreds of thousands of phishing websites and found that there&#8217;s been a significant rise in websites designed specifically for mobile phishing attacks, now making up three quarters of all phishing sites.&nbsp;<\/p>\n<p>The smaller screens of smartphones and other mobile devices make it <a href=\"https:\/\/www.zdnet.com\/article\/phishing-attacks-are-harder-to-spot-on-your-smartphone-thats-why-hackers-are-using-them-more\/\" target=\"_blank\" rel=\"noopener\">more challenging for users identify phishing emails<\/a> and malicious websites. &nbsp;<\/p>\n<p>For example, the sender address is more prominent on a desktop browser than on mobile, meaning that unless a user really examines the email, they might not notice it&#8217;s being sent from a phoney address. &nbsp;<\/p>\n<p>It&#8217;s also more difficult to see the address of links on mobile devices. When using a laptop or desktop computer, the user can hover the mouse curser over the hyperlink, which can reveal the URL \u2013 potentially alerting them to it being malicious, particularly if it features poor spelling or large strings of random text.&nbsp;<\/p>\n<p>It&#8217;s much less intuitive to do this to check links on smartphones, making users less likely to check where the email has really come from and more likely to click through if the lure is convincing. &nbsp;<\/p>\n<p>While many phishing attacks arrive by email, targeting mobile devices also offers cyber criminals with an expanded variety of attack vectors including <a href=\"https:\/\/www.zdnet.com\/article\/scam-spam-and-phishing-texts-how-to-spot-sm-fraud-and-stay-safe\/\" target=\"_blank\" rel=\"noopener\">SMS messages<\/a>, messaging applications, in-app chat links and more, all of which can be used to direct victims to malicious sites.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/#link=%7B%22linkText%22:%22Cybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report)%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%23link=%7B%22role%22:%22standard%22,%22href%22:%22https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/%23link=%7B%22linkText%22:%22Cybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report)%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D%22,%22target%22:%22%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3ECybersecurity:%20Let's%20get%20tactical%20(ZDNet%20special%20report%3C\/strong%3E%22%7D\" target=\"_blank\" rel=\"noopener\"><strong>Cybersecurity: Let&#8217;s get tactical<\/strong><\/a><strong>&nbsp;(ZDNet special report)&nbsp;<\/strong><\/p>\n<p>Many of these mobile phishing websites are designed to look indistinguishable from the brand they&#8217;re imitating. Some of the <a href=\"https:\/\/www.zdnet.com\/article\/phishing-warning-these-are-the-brands-most-likely-to-be-impersonated-by-crooks-so-stay-alert\/\" target=\"_blank\" rel=\"noopener\">top brands most commonly imitated by phishing websites<\/a> include Microsoft, Amazon, Facebook and PayPal, as well as a string of delivery companies related to the region being targeted.&nbsp;<\/p>\n<p>&#8220;Distributed and hybrid workforces, ever-connected devices, high speed 5G connectivity, and increased critical data access from remote locations have spread enterprises worldwide,&#8221; said Shridhar Mittal, CEO of Zimperium.&nbsp;<\/p>\n<p>&#8220;Today&#8217;s cybersecurity was not built to support these environments \u2013 and attackers know it. Organizations need to come to terms with how to effectively secure this new reality,&#8221; he added.&nbsp;<\/p>\n<p>Users can help to protect themselves from mobile phishing attacks by being cautious about what links they follow. If an email alert or text message claims to come from a particular brand, rather than clicking the link in the email, it&#8217;s often wiser to go to the actual website of the brand in your browser and login to your account from there.&nbsp;<\/p>\n<p>For businesses, it can be helpful to roll-out security protections to smartphones used by employees to help detect and prevent threats. The use of <a href=\"https:\/\/www.zdnet.com\/article\/multi-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\/\" target=\"_blank\" rel=\"noopener\">multi-factor authentication<\/a> should also be encouraged, because it provides an additional barrier to compromised usernames and passwords being exploited.&nbsp;<\/p>\n<p>Anyone who suspects that one of their accounts has fallen victim to a phishing attack should immediately change their password.&nbsp;<\/p>\n<p><strong>MORE ON CYBERSECURITY<\/strong><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We use smartphones for almost everything &#8211; cyber criminals know this and are looking to exploit it.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45720","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing attempts against smartphones are on the rise. And those small screens aren&#039;t helping 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing attempts against smartphones are on the rise. And those small screens aren&#039;t helping 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-15T13:47:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Phishing attempts against smartphones are on the rise. And those small screens aren&#8217;t helping\",\"datePublished\":\"2022-03-15T13:47:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/\"},\"wordCount\":563,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\\\/2020\\\/09\\\/24\\\/165bfe7b-df67-48b2-bd03-21b60e4db339\\\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/\",\"name\":\"Phishing attempts against smartphones are on the rise. And those small screens aren't helping 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\\\/2020\\\/09\\\/24\\\/165bfe7b-df67-48b2-bd03-21b60e4db339\\\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-03-15T13:47:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\\\/2020\\\/09\\\/24\\\/165bfe7b-df67-48b2-bd03-21b60e4db339\\\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\\\/2020\\\/09\\\/24\\\/165bfe7b-df67-48b2-bd03-21b60e4db339\\\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing attempts against smartphones are on the rise. And those small screens aren&#8217;t helping\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing attempts against smartphones are on the rise. And those small screens aren't helping 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/","og_locale":"en_US","og_type":"article","og_title":"Phishing attempts against smartphones are on the rise. And those small screens aren't helping 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-15T13:47:01+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Phishing attempts against smartphones are on the rise. And those small screens aren&#8217;t helping","datePublished":"2022-03-15T13:47:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/"},"wordCount":563,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/","url":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/","name":"Phishing attempts against smartphones are on the rise. And those small screens aren't helping 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-03-15T13:47:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ab102f1232d1d9c1b3f365eb20d846a19d7e144\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/istock-worried-woman-using-a-smartphone.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/phishing-attempts-against-smartphones-are-on-the-rise-and-those-small-screens-arent-helping\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing attempts against smartphones are on the rise. And those small screens aren&#8217;t helping"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45720"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45720\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}