SlideShare a Scribd company logo
A DIGITAL LIFE E-GUIDE
Protecting Yourself
AgainstMobilePhishing
Protecting Yourself Against Mobile Phishing
More and more people are enjoying online activities via mobile devices.
A comScore research1
says that 4 of 5 US users shop online via
smartphone. They also found out that 52% of users browse websites2
on their gadgets, while 39% visit social networking sites or blogs.
You should be able to enjoy these activities safely, without worrying
about threats like mobile phishing. This is easy to do, as long as you
understand what it is and how you can protect yourself from it.
Mobile phishing is simply phishing done via a mobile device, like your
smartphone or tablet. Phishing is when cybercriminals solicit your
personal information—like usernames and passwords—by spoofing
the email or websites of legitimate entities. If you use your gadget for
activities that require you to log in to a page, such as online banking,
shopping, and social networking, then you’re at risk to this threat. What
makes mobile phishing different from its desktop version is that it takes
advantage of the limitations of the mobile platform in order to steal
your information.
Some of these limitations include:
•	 Small screen size – This limits your device’s ability to display
everything3
on a mobile browser. Cybercriminals can use this to
conceal telltale elements on their phishing pages.
•	 Default browsers – Certain devices prevent you from using more
secure browsers. They have pre-installed default browsers that
automatically open any clicked link.
•	 Simple UI (User Interface) design – Mobile device UIs are
designed for a quick and streamlined user experience, so some
security measures are skipped. This puts you at risk. A Georgia
Tech University study4
shows that most mobile browsers forgo
displaying graphical icons that indicate a website’s legitimacy and
connection security.
These limitations aren’t necessarily harmful. But they are also not very
helpful in securing you against mobile phishing.
1	http://www.comscore.com/Insights/Press_Releases/2012/9/Retailers_Carving_Out_Space_in_the_M-Commerce_
Market
2	http://www.comscore.com/Insights/Press_Releases/2013/1/comScore_Reports_November_2012_U.S._Mobile_Sub-
scriber_Market_Share
3	http://blog.trendmicro.com/trendlabs-security-intelligence/mobile-browser-security-problem-exists-between-
device-and-chair/
4	http://www.gatech.edu/research/news/mobile-browsers-fail-georgia-tech-safety-test
What They Don’t
Want You to See
Mobile phishing pages hide malicious routines that enable
cybercriminals to steal your personal information. Cybercriminals
see your data as assets they can either sell or use to carry out
other schemes. Here’s what cybercriminals are after:
•	 Your financial accounts – Cybercriminals are known to break
into bank accounts and siphon money off of them.
•	 Your social networking accounts – Cybercriminals can hijack
your social networking accounts in order to spread scams and
malware to others in your contact list. They can also mine
your contacts’ accounts for more personal information.
•	 Your online shopping accounts – Cybercriminals can use
your own online shopping account to buy themselves very
expensive gifts, especially if your card is already tied to the
account.
•	 Your identity and reputation – Cybercriminals can use your
profile, name, or image to pose as you to your coworkers,
family, or friends in order to scam them. They may also use
your personal information in an attempt to damage your or
someone else’s reputation.
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
Proceed with Caution
Every time you browse the Internet, be aware of the signs of
mobile phishing.
1.	 Altered URLs: Cybercriminals take advantage of a mobile
device’s small screen. The address bar’s size can hide the
difference between a phishing page URL from a legitimate
one. Below is a side-by-side comparison showing the
difference in the URLs.
Notice that the legitimate URL uses HTTPS, a secure
protocol, while the phishing URL does not. The fake PayPal
URL also has additional text in the address.
2.	 Fishy graphics and typographical errors: Looking at the
example above, the phishing site also sports an unfamiliar
new logo and altered text. If you’re not keen enough to
know what the legitimate page looks like, chances are, you
might get tricked.
Figure 1. Fake Paypal URL and page (left) vs. legitimate URL and site (right)
Considering the shift towards using mobile devices in this “post-PC”
era, mobile phishing isn’t only real, it’s also inevitable. Here are ways to
protect yourself against it.
•	 Use official apps. If your online banking or shopping website has
an app, use that instead of your mobile browser. But make sure to
download these apps only from their official sources. This cuts out
the middleman and makes the transaction strictly between you and
your website. This denies cybercriminals the opportunity to phish
for your information.
•	 Avoid clicking links or opening attachments in emails from
suspicious senders. Always verify the emails you receive before
taking any action. The links and files within them can be malicious.
•	 Double check the webpage and its URL. If you’ve already landed on
a phishing page, be vigilant. Consider how you got there and inspect
the details. Did you click on a link you got from an email? There
are legitimate emails that ask you to do this—email verification for
example—but this is how phishing mails usually operate.
Tap your online browser’s address bar to fully display its
contents. Scan for typographical errors or additional characters.
Cybercriminals take over domains, banking on users making errors
while typing or not noticing changes in the URL.
•	 Bookmark websites you frequent. If you must use your
smartphone’s mobile browser, bookmark the sites you use
frequently. This lessens your chances of landing on a phishing
website due to spelling mistakes.
•	 Get a mobile security solution. Trend Micro™ Mobile Security keeps
your mobile device and mobile data safe by identifying and blocking
not only phishing threats, but also other web threats like malicious
or high-risk URL and apps.
What You Can Do
Protecting Yourself Against Mobile Phishing
©2013 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro,
Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.
TRENDLABS
TrendLabs is a multinational research, development,
and support center with an extensive regional
presence committed to 24 x 7 threat surveillance,
attack prevention, and timely and seamless solutions
delivery. With more than 1,000 threat experts and
support engineers deployed round-the-clock in labs
located around the globe, TrendLabs enables Trend
Micro to continuously monitor the threat landscape
across the globe; deliver real-time data to detect, to
preempt, and to eliminate threats; research on and
analyze technologies to combat new threats; respond
in real time to targeted threats; and help customers
worldwide minimize damage, reduce costs, and ensure
business continuity.
TREND MICRO
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global
cloud security leader, creates a world safe for exchanging
digital information with its Internet content security
and threat management solutions for businesses and
consumers. A pioneer in server security with over
20 years’ experience, we deliver top-ranked client, server
and cloud-based security that fits our customers’ and
partners’ needs, stops new threats faster, and protects data
in physical, virtualized and cloud environments. Powered
by the industry-leading Trend Micro™ Smart Protection
Network™ cloud computing security infrastructure, our
products and services stop threats where they emerge—
from the Internet. They are supported by 1,000+ threat
intelligence experts around the globe.

More Related Content

PDF
Blue Coat 2013 Systems Mobile Malware Report
PDF
Top Cyber Threats of 2009
PPTX
Symantec Report On Rogue Security Software
PDF
Compilation of phishing and keylogger attacks
PPTX
Phishing and hacking
PDF
Avoiding Bad URL's In the Mobile Web
PPTX
PPTX
Cyber Crime
Blue Coat 2013 Systems Mobile Malware Report
Top Cyber Threats of 2009
Symantec Report On Rogue Security Software
Compilation of phishing and keylogger attacks
Phishing and hacking
Avoiding Bad URL's In the Mobile Web
Cyber Crime

What's hot (19)

PPTX
Cyber Security Motivation
PPTX
Phishing attack till now
PPTX
Phishing--The Entire Story of a Dark World
PPTX
secure from Phishing Hacking and Keylogger
PDF
Smartphone 7 aug14
PPTX
Phishing technology
PPTX
PHISHING PROJECT REPORT
DOCX
Five cyber threats to be careful in 2018
PPT
Social Networking Threats
PPTX
Phishing technology
PPTX
Phishing
PDF
Evolutionand impactofhiddenmobilethreats wandera
PDF
Social Media & Crime
PDF
RSA Monthly Online Fraud Report -- August 2013
 
PPTX
Phishing
PDF
Year of the AppSec Breach_Forrester
PPSX
What Are My Risks
PPTX
Data breach
PPTX
Digital privacy
Cyber Security Motivation
Phishing attack till now
Phishing--The Entire Story of a Dark World
secure from Phishing Hacking and Keylogger
Smartphone 7 aug14
Phishing technology
PHISHING PROJECT REPORT
Five cyber threats to be careful in 2018
Social Networking Threats
Phishing technology
Phishing
Evolutionand impactofhiddenmobilethreats wandera
Social Media & Crime
RSA Monthly Online Fraud Report -- August 2013
 
Phishing
Year of the AppSec Breach_Forrester
What Are My Risks
Data breach
Digital privacy
Ad

Similar to Protecting Yourself Against Mobile Phishing (20)

PPT
Exploring And Investigating New Dimensions In Phishing
PDF
PPTX
Phishing technology
PPTX
Phishing technology
PPTX
IS Presetation.pptx
PPTX
Phishing Attack : A big Threat
PPTX
Phishing
PDF
PHISHING PROTECTION
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PPT
Computer 4 ict
PPT
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
PPT
Online Self Defense
PPTX
Unveiling the dark web. The importance of your cybersecurity posture
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PDF
10 tips to prevent phishing attacks
PPTX
Mobile Security for the Modern Tech Mogul
PPTX
PDF
Mc physics colloquium2018-03-30.-handouts
Exploring And Investigating New Dimensions In Phishing
Phishing technology
Phishing technology
IS Presetation.pptx
Phishing Attack : A big Threat
Phishing
PHISHING PROTECTION
Phishing attack, with SSL Encryption and HTTPS Working
Computer 4 ict
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
Online Self Defense
Unveiling the dark web. The importance of your cybersecurity posture
Phishing Scams: 8 Helpful Tips to Keep You Safe
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
10 tips to prevent phishing attacks
Mobile Security for the Modern Tech Mogul
Mc physics colloquium2018-03-30.-handouts
Ad

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
The AUB Centre for AI in Media Proposal.docx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
Advanced Soft Computing BINUS July 2025.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Protecting Yourself Against Mobile Phishing

  • 1. A DIGITAL LIFE E-GUIDE Protecting Yourself AgainstMobilePhishing
  • 3. More and more people are enjoying online activities via mobile devices. A comScore research1 says that 4 of 5 US users shop online via smartphone. They also found out that 52% of users browse websites2 on their gadgets, while 39% visit social networking sites or blogs. You should be able to enjoy these activities safely, without worrying about threats like mobile phishing. This is easy to do, as long as you understand what it is and how you can protect yourself from it. Mobile phishing is simply phishing done via a mobile device, like your smartphone or tablet. Phishing is when cybercriminals solicit your personal information—like usernames and passwords—by spoofing the email or websites of legitimate entities. If you use your gadget for activities that require you to log in to a page, such as online banking, shopping, and social networking, then you’re at risk to this threat. What makes mobile phishing different from its desktop version is that it takes advantage of the limitations of the mobile platform in order to steal your information. Some of these limitations include: • Small screen size – This limits your device’s ability to display everything3 on a mobile browser. Cybercriminals can use this to conceal telltale elements on their phishing pages. • Default browsers – Certain devices prevent you from using more secure browsers. They have pre-installed default browsers that automatically open any clicked link. • Simple UI (User Interface) design – Mobile device UIs are designed for a quick and streamlined user experience, so some security measures are skipped. This puts you at risk. A Georgia Tech University study4 shows that most mobile browsers forgo displaying graphical icons that indicate a website’s legitimacy and connection security. These limitations aren’t necessarily harmful. But they are also not very helpful in securing you against mobile phishing. 1 http://www.comscore.com/Insights/Press_Releases/2012/9/Retailers_Carving_Out_Space_in_the_M-Commerce_ Market 2 http://www.comscore.com/Insights/Press_Releases/2013/1/comScore_Reports_November_2012_U.S._Mobile_Sub- scriber_Market_Share 3 http://blog.trendmicro.com/trendlabs-security-intelligence/mobile-browser-security-problem-exists-between- device-and-chair/ 4 http://www.gatech.edu/research/news/mobile-browsers-fail-georgia-tech-safety-test
  • 4. What They Don’t Want You to See Mobile phishing pages hide malicious routines that enable cybercriminals to steal your personal information. Cybercriminals see your data as assets they can either sell or use to carry out other schemes. Here’s what cybercriminals are after: • Your financial accounts – Cybercriminals are known to break into bank accounts and siphon money off of them. • Your social networking accounts – Cybercriminals can hijack your social networking accounts in order to spread scams and malware to others in your contact list. They can also mine your contacts’ accounts for more personal information. • Your online shopping accounts – Cybercriminals can use your own online shopping account to buy themselves very expensive gifts, especially if your card is already tied to the account. • Your identity and reputation – Cybercriminals can use your profile, name, or image to pose as you to your coworkers, family, or friends in order to scam them. They may also use your personal information in an attempt to damage your or someone else’s reputation.
  • 7. Proceed with Caution Every time you browse the Internet, be aware of the signs of mobile phishing. 1. Altered URLs: Cybercriminals take advantage of a mobile device’s small screen. The address bar’s size can hide the difference between a phishing page URL from a legitimate one. Below is a side-by-side comparison showing the difference in the URLs. Notice that the legitimate URL uses HTTPS, a secure protocol, while the phishing URL does not. The fake PayPal URL also has additional text in the address. 2. Fishy graphics and typographical errors: Looking at the example above, the phishing site also sports an unfamiliar new logo and altered text. If you’re not keen enough to know what the legitimate page looks like, chances are, you might get tricked. Figure 1. Fake Paypal URL and page (left) vs. legitimate URL and site (right)
  • 8. Considering the shift towards using mobile devices in this “post-PC” era, mobile phishing isn’t only real, it’s also inevitable. Here are ways to protect yourself against it. • Use official apps. If your online banking or shopping website has an app, use that instead of your mobile browser. But make sure to download these apps only from their official sources. This cuts out the middleman and makes the transaction strictly between you and your website. This denies cybercriminals the opportunity to phish for your information. • Avoid clicking links or opening attachments in emails from suspicious senders. Always verify the emails you receive before taking any action. The links and files within them can be malicious. • Double check the webpage and its URL. If you’ve already landed on a phishing page, be vigilant. Consider how you got there and inspect the details. Did you click on a link you got from an email? There are legitimate emails that ask you to do this—email verification for example—but this is how phishing mails usually operate. Tap your online browser’s address bar to fully display its contents. Scan for typographical errors or additional characters. Cybercriminals take over domains, banking on users making errors while typing or not noticing changes in the URL. • Bookmark websites you frequent. If you must use your smartphone’s mobile browser, bookmark the sites you use frequently. This lessens your chances of landing on a phishing website due to spelling mistakes. • Get a mobile security solution. Trend Micro™ Mobile Security keeps your mobile device and mobile data safe by identifying and blocking not only phishing threats, but also other web threats like malicious or high-risk URL and apps. What You Can Do
  • 10. ©2013 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. TRENDLABS TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24 x 7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity. TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge— from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.