Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Lookout Exec: Why Mobile Phishing Is Advancing So Fast and Working So Often
Cybersecurity

Lookout Exec: Why Mobile Phishing Is Advancing So Fast and Working So Often

Tom SmithBy Tom SmithMarch 2, 2023Updated:March 2, 20233 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Episode 54 of the Cybersecurity Minute features highlights from an interview with Aaron Cockerill, chief strategy officer of Lookout, on his company’s mobile phishing research that was released this week. Cockerill met with Tom Smith and Kieron Allen from the Acceleration Economy analyst team to talk about the findings, where the biggest threats lie, and how companies can protect their data and systems from evolving forms of phishing.

See the Cybersecurity Top 10 shortlist

Lookout is on Acceleration Economy’s Top 10 Shortlist of Cybersecurity Business Enablers. The report is available through the Lookout website.

This episode is sponsored by Acceleration Economy’s Digital CIO Summit, taking place April 4-6. Register for the free event here. Tune in to the event to hear from CIO practitioners discuss their modernization and growth strategies.

Highlights

01:45 — The analysts ask Aaron how Lookout gathers the mobile phishing data, why users are clicking on more phishing links than ever before, the tools and strategies that can be employed to combat phishing in its various forms, and, finally, the most surprising finding(s). If you weren’t aware, phishing now extends to voice, SMS, and QR codes.

Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

03:13 — Cockerill explains that Lookout protects over 210 million devices from malicious attack and its software looks at URLs that are sent to the device for legitimacy and to determine whether they’re malicious, phishing links, and so on. He notes that Lookout analyzes “large swaths” of the internet, reviewing over four million links a day to see if they are potentially malicious. In the report, there’s a distinction between whether people who encounter or receive a link actually click on it. Users still click on them, unfortunately, in an increasing number of cases, even when they are warned about the links.

04:08 — Cockerill says the company is not trying to sensationalize the data, but rather trying to show the increasing numbers over time and why enterprises need protection against mobile phishing. Phishing attacks are working because bad actors have increasingly effective methods of getting users to click; they increasingly look legitimate. More sophisticated attacks are now leveraging multiple forms of social engineering such as a simultaneous phone call and SMS message that says it’s coming from a known brand.

06:20 — Asked how companies can prevent or mitigate such attacks, Cockerill notes there’s no silver bullet. One of the important layers of protection is filtering URLs using a platform like Lookout. Another critical part is training users. Most companies tend to run education programs around what is a good versus bad link or what is a good versus bad email. All of those are increasingly important, but they also need to educate users about the evolving tactics that are being used.

08:16 — Asked what is most surprising about the results, Cockerill notes his concern over the rate at which users are actually clicking on these links. In 2020, enterprise users clicked at a 1.6% rate. Now that’s over 11%. The rate for personal devices is higher at 27%. Cockerill says that’s a very troubling statistic.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Interested in Lookout?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Cybersecurity data featured Lookout mobile phishing
Share. Facebook Twitter LinkedIn Email
Analystuser

Tom Smith

Editor in Chief, analyst, Cloud Wars

Areas of Expertise
  • AI/ML
  • Business Apps
  • Cloud
  • Digital Business

Tom Smith analyzes AI, copilots, cloud companies, and tech innovations for Cloud Wars. He has worked as an analyst tracking technology and tech companies for more than 20 years.

  Contact Tom Smith ...

Related Posts

Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance

June 24, 2025

AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country

June 24, 2025

Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration

June 24, 2025

AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’

June 24, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance
  • AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country
  • Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration
  • AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’
  • Larry Ellison Declares Oracle Will Be #1 in Cloud Databases, Apps, and AI Data Centers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.