Mobile phishing is a bigger threat than email now – how to stay protected


iPhone 17e

Kyle Kucharski/ZDNET

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Verizon’s DBIR reveals top business security trends.
  • Mobile phishing is outpacing email-based attacks.
  • Companies need mobile-focused phishing training.

Mobile attack vectors are outstripping email threats as we become more able to detect traditional phishing attempts, Verizon said in a new report exploring the data breach landscape and the impact on businesses worldwide.

Also: Worried about the nationwide Canvas data breach? Take these 6 steps now

In Verizon’s 2026 Data Breach Investigations Report (DBIR), the company said that mobile-centric cyberattacks are increasing in popularity and have a higher click rate than the same phishing attempts sent via email, which raises questions about whether our existing phishing protections are adequate.

Mobile social engineering takes center stage

Based on data collected from more than 31,000 real-world security incidents in 2025, with 22,000 confirmed data breaches impacting organizations in 145 countries, Verizon says that “mobile is more dangerous than email.”

Also: The best mobile antivirus software of 2026: Expert tested and reviewed

A set of phishing simulation assessments backs up this claim, in which mobile-centric attack vectors — including voice-based phishing (vishing) and text scams — were successful lures, achieving a 40% higher click-through rate than traditional email phishing scams.

The human element

People are often the weakest link in security systems, and threat actors know it. However, that doesn’t mean we aren’t improving our general cybersecurity awareness; it just means cybercriminals are switching up their tactics.

According to Verizon’s report, the “human element” was present in 62% of known and recorded data breaches, a marginal increase of 2% year over year.

Also:The shadowy SIM farms behind those incessant scam texts – and how to stay safe

Unfortunately, the data reveals that many cybercriminals are abusing our trust to steal data, commit payment fraud, or act as a precursor to severe security incidents, including ransomware deployment and extortion.

When sending a phishing email isn’t enough, they have begun what Verizon calls “pretexting,” a concerning development that highlights how psychology now more often plays a part in modern cyberattacks.

Pretexting vs. phishing

Social engineering, which accounts for 16% of all breaches, refers to psychological exploitation to persuade us to take actions that risk our personal security and privacy, or that of a business, such as our employer.

These tactics can range from a member of staff allowing a criminal posing as a delivery driver to enter a secure building to someone posing as one of your loved ones in a financial emergency.

When applied to mobile technology, phishing often takes the form of fake texts, voice notes, and calls for nefarious purposes. It’s not just a cybercriminal pretending to be you and calling your telecoms provider to swap your SIM; if “pretexting” is used as a tactic, a foundation of trust is laid between the criminal and the victim before a trap is sprung.

Also: How to check if a text message is spam on Android – and the free tool I rely on

Consider it an upgrade over generic phishing attempts used in targeted, more sophisticated attacks. For example, an employee in finance could be targeted, with a friendly rapport built through mobile messaging and calls, and with an attacker pretending to be an executive, team member, or vendor. When enough trust has been established, the victim is then tricked into changing an invoice’s payment details, sending cash unwittingly to a criminal instead of a supplier.

Average click-through rates for simulated email phishing campaigns in Verizon’s dataset were 1.4%, compared to phone-based phishing rates of around 2%, a 40% increase.

“Regardless of the terminology, various attackers have been leveraging these means by impersonating help desk agents or users needing a password reset, with moderate levels of success,” the report says. “The bottom line here is that social attacks using phone-centric vectors — text messages, voice, or callback-focused emails — are more successful in our dataset than using the traditional email vector defenders are used to.”

More key security trends

Verizon’s research also revealed that nearly a third (31%) of breaches now start with the exploitation of vulnerabilities, marking the first time that exploiting security flaws has surpassed the use of stolen credentials as an initial entry point into a target system, now recorded as the reason for 13% of incidents.

This shift is believed to be due to AI. According to the report, AI is being leveraged by cybercriminals to reduce the time required to exploit vulnerabilities, “shrinking the window for defense from months to mere hours.”

Also: This simple ChatGPT trick helps you spot scams before you click or respond

Furthermore, only 26% of critical vulnerabilities recorded by CISA were fully patched and resolved in 2025, a drop from 38% in 2024.

Another interesting trend that organizations should be aware of is shadow AI. Businesses have long been aware of shadow IT, the use of devices and online services by employees without explicit approval, but now shadow AI is also a potential security risk.

In total, 67% of employees are using non-corporate AI accounts on their company-issued devices. Shadow AI was the third most common non-malicious insider threat recorded last year, with users frequently submitting sensitive, confidential company data to these models, including source code, research, and technical documents.

How to stay protected

As the sample sizes are small, the common threads of Verizon’s research on mobile-centric phishing do have some caveats. However, this is because few data points were available, as there don’t appear to be many companies conducting mobile-focused phishing simulations or training — which, in turn, has revealed a potential problem.

Phishing training is nothing new, although its benefits are debatable, especially when it is considered just an annual exercise to tick a box. But with few organizations considering the mobile aspect of modern phishing tactics, they may be exposing themselves to greater risks, especially when employees are using their own devices to access corporate networks and systems.

If cybercriminals are allowed to bypass security systems by contacting unwitting employees directly, investments in anti-phishing defenses could be rendered worthless.

For organizations, the answer is developing new strategies to combat traditional and evolving phishing threats across email and mobile. With “pretexting” also on the rise, training should teach staff that phishing is no longer just spray-and-pray emails — these criminals will tug at your heartstrings and exploit your trust to achieve their goals.

Also: Cloud attacks are getting faster and deadlier – 4 ways to secure your business

Furthermore, these attacks can occur through employee-owned devices, which are outside your control and could pose invisible threats to corporate security, so organizations should reconsider permitting access or revoking bring-your-own-device schemes. It might save companies cash in the short term to allow members of staff to use their own smartphones, but a data breach isn’t cheap.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


The first computer my family owned was an 80286 IBM clone, and it had lots of ports, none of which looked the same. There was a big 5-pin DIN for the keyboard, a serial port, a parallel port, a game port for our joystick, and of course, the VGA port for the monitor.

In comparison, a modern computer has much less diversity in the port department. Not only are there fewer types of ports, but the total number may be quite low as well. When we move to modern laptops, it can be much more minimalist. Some laptops have just a single port on the entire machine! Is this a bad thing? As with anything, the extremes are rarely ideal, but I’d say overall, this has been a pretty positive development for PCs.

The port explosion era was never sustainable

It was more like a port infection

You see, the reason we had so many ports for so long is that people kept inventing new interfaces to make up for the shortcomings of existing ones. However, instead of the newer, better interfaces making the old ones obsolete, they just became additive as perfectly summarized in this classic XKCD comic.

A comic illustrates how competing standards multiply: first showing 14 competing standards, then people agreeing to create one universal standard, followed by a final panel showing there are now 15 competing standards. Credit: Randall Munroe (CC-BY-NC)

In laptops, the need for so many ports reached ridiculous heights. In this video posted by X user PC Philanthropy, you can see his Sager/Clevo D9T absolutely packed with all the trimmings leading to a rather massive laptop.

It is undeniably a cool machine, but obviously goes against the principle of portable computing. Also, every port you install means power and space that could have been taken up by something else. That’s true for laptops and desktops.



















Quiz
8 Questions · Test Your Knowledge

PC ports and motherboard I/O
Trivia challenge

Think you know your USB from your PCIe? Put your connector knowledge to the test.

PortsStandardsHardwareConnectorsMotherboards

Which USB connector type is fully reversible, meaning it can be plugged in either way?

Correct! USB Type-C features a symmetrical oval design that lets you insert it in either orientation. Introduced in 2014, it has become the dominant connector for modern devices and supports everything from data transfer to video output and fast charging.

Not quite — the answer is USB Type-C. The older USB Type-A connector (the flat rectangular one) famously required you to flip it at least twice before getting it right. USB Type-C’s reversible design was one of its biggest selling points when it launched in 2014.

What does the ‘x16’ in a PCIe x16 slot refer to?

Exactly right! PCIe x16 means the slot has 16 data lanes, allowing significantly more bandwidth than smaller x1 or x4 slots. This is why discrete graphics cards almost always use x16 slots — they need that extra throughput to feed pixel data to your display.

Not quite — the ‘x16’ refers to the number of data lanes. More lanes mean more simultaneous data paths between the CPU and the card. Graphics cards use x16 slots because their massive data demands require all 16 of those lanes working together.

Which port on a motherboard is most commonly used to connect a display directly to the CPU’s integrated graphics?

That’s correct! The HDMI and DisplayPort connectors found on a motherboard’s rear I/O panel are wired directly to the CPU’s integrated graphics unit. If you have a discrete GPU installed, you should use that card’s outputs instead for best performance.

The right answer is the HDMI or DisplayPort connectors on the rear I/O panel. These ports bypass the discrete GPU entirely and tap into the CPU’s built-in graphics. It’s a common troubleshooting trap — plugging a monitor into the motherboard instead of the GPU and wondering why nothing works.

What is the primary function of the 24-pin ATX connector on a motherboard?

Spot on! The 24-pin ATX connector is the main power connector that delivers multiple voltage rails — including 3.3V, 5V, and 12V — from the power supply to the motherboard. Without it seated properly, your PC simply won’t power on at all.

The correct answer is delivering power from the PSU to the motherboard. The 24-pin ATX connector is the big wide plug you’ll find on every modern motherboard. It supplies several different voltage levels that the board distributes to components. PCIe cards get their supplemental power from separate 6- or 8-pin connectors directly from the PSU.

Which of the following rear I/O ports transmits both audio and video in a single cable and is most commonly found on modern motherboards?

Correct! HDMI carries both high-definition audio and video over a single cable, making it one of the most convenient display connectors available. It became standard on motherboards as integrated graphics improved, and modern versions support 4K and even 8K resolutions.

The answer is HDMI. VGA is analog-only and carries no audio, DVI-D is digital video only without audio, and S-Video is an older analog format. HDMI bundles both audio and video digitally, which is why it became the go-to connector for TVs, monitors, and motherboard rear panels alike.

What maximum theoretical data transfer speed does USB 3.2 Gen 2×2 support?

Impressive! USB 3.2 Gen 2×2 achieves 20 Gbps by using two 10 Gbps lanes simultaneously — that’s what the ‘2×2’ means. It requires a USB Type-C connector and is most commonly found on high-end motherboards, making it ideal for fast external SSDs.

The correct answer is 20 Gbps. The ‘2×2’ in the name is the key clue — it bonds two 10 Gbps channels together. USB naming got notoriously confusing around this era, with the same physical port potentially supporting very different speeds depending on the generation label printed in the spec sheet.

What is the role of the M.2 slot found on most modern motherboards?

Well done! M.2 is a compact form-factor slot that most commonly hosts NVMe SSDs, which connect via PCIe lanes for blazing-fast storage speeds. Some M.2 slots also support SATA-based SSDs and Wi-Fi/Bluetooth combo cards, making the slot surprisingly versatile.

The correct answer is housing compact storage drives or wireless cards. M.2 replaced the older mSATA standard and supports both PCIe NVMe drives and SATA drives depending on the slot’s keying. NVMe M.2 drives can achieve sequential read speeds many times faster than traditional SATA SSDs.

Which audio connector color on a standard PC rear I/O panel is designated for the main stereo line output to speakers or headphones?

That’s right! The green 3.5mm jack is the standard line-out port used for speakers and headphones in the PC audio color-coding scheme. Blue is line-in for recording, and pink is the microphone input — a color system that’s been consistent across PC motherboards for decades.

The correct answer is green. PC audio jacks follow a long-standing color convention: green for headphones and speakers, blue for line-in (recording from external sources), and pink for the microphone. It’s one of those legacy standards that has quietly persisted even as USB and digital audio have become more common.

Challenge Complete

Your Score

/ 8

Thanks for playing!

USB-C (almost) solved the problem

So close, but not quite there yet

Released to the public in the mid ’90s, USB came to the rescue. The “U” is for “Universal” and for the most part USB has lived up to that promise. Now there was one port that handled data and power. More importantly, USB is fully backwards compatible. So if you plug a USB 1.1 device into a modern USB port, it should work. Whether you can get software drivers for it is another story, but it will talk to the host device.

USB-C has proven to be less universal than I’d like, and the situation is still far better than it used to be. A single USB-C port on one of my laptops can act as a video output for just about anything, even an old VGA monitor.

A Macbook, CRT monitor, and iPad connected together. Credit: Sydney Louw Butler/How-To Geek

My smaller laptops don’t need special chargers anymore, and the latest laptops can pull 240W over USB-C, which is enough for all but the beefiest desktop replacement machines. There is no type of peripheral I can think of that doesn’t give you the option to use it over USB.

But the complaints aren’t so much that we only get USB these days, it’s more that we get so little of it.

Minimal I/O enables better hardware design

Harder, better, faster, stronger

When you only put a handful of USB-C ports on a mobile computer, you reap numerous benefits. The low profile of USB-C means the laptop can be thinner, and the frame can be a stronger and more rigid unibody design. Internally, you have room for more battery, larger performance components, or better cooling.

A green Apple MacBook Neo on display on a wooden table with a product sign behind it. Credit: Patrick Campanale / How-To Geek

It also means the internals can be simpler, and cheaper to design and fabricate, though whether those savings are passed on to customers is another story altogether.

Wireless and cloud-first workflows reduce physical dependency

I guess they are “air” ports

Perhaps the first sign of major change was when smartphones dropped headphone jacks, but the fact is that wireless technologies are now good enough for most peripheral and data connections. So, there’s no need to connect them directly to a port on a computer. Which, in turn, means that there’s no reason to have as many ports on the computer in the first place.

I can’t remember the last time I used a wired mouse or keyboard, and I only use Ethernet for devices that need extremely high speeds, low latency, or improved reliability. For normal day-to-day use, modern Wi-Fi is just fine. So while your laptop might not have as many wired ports on the outside, those wireless chips on the inside still give it numerous connectivity options for audio, input, and data transfer.

You could even make the same argument about storage to some extent, with many thin and light systems leaning on cloud storage to make up for a lack of ports to connect external storage.

MacBook Neo colors on a white background.

Operating System

macOS

CPU

A18 Pro

The MacBook Neo with the A18 Pro chip is Apple’s most affordable laptop yet, with all-day battery life and buttery-smooth performance in a thin and light profile.



The dongle backlash misses the bigger picture

The last bit of the port protest centers around dongles, but I never understood the complaints. Having one port that can be broken out into whatever ports you need using a little box is amazing. It makes ports optional and gives you the choice. If you never plug your laptop into anything, why deal with all the ports you’ll never use?

Likewise, if you only ever use ports with your laptop when you dock it at a desk, then you can just leave your dongle ready to go on your desk, but throwing a small dongle in your laptop sleeve or bag in case you might need it is a small price to pay for all the benefits of minimal IO.



Source link