{"id":9383,"date":"2025-03-26T11:10:07","date_gmt":"2025-03-26T17:10:07","guid":{"rendered":"https:\/\/swimlane.com\/resource\/mobile-phishing\/"},"modified":"2025-03-26T11:10:14","modified_gmt":"2025-03-26T17:10:14","slug":"%e3%83%a2%e3%83%90%e3%82%a4%e3%83%ab%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/","title":{"rendered":"\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u306e\u5897\u52a0\u3068\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u306e\u9632\u6b62\u65b9\u6cd5"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Illustration of phishing attack on smartphone with password prompt and security shield icon.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-03-26T11:10:07-06:00\">3\u6708 26, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Rise of Mobile Phishing and How to Prevent Mobile Phishing<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Rise%20of%20Mobile%20Phishing%20and%20How%20to%20Prevent%20Mobile%20Phishing').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fmobile-phishing%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Rise%20of%20Mobile%20Phishing%20and%20How%20to%20Prevent%20Mobile%20Phishing&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fmobile-phishing%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fmobile-phishing%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fmobile-phishing%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-mobile-phishing-attack-techniques-amp-how-to-prevent-mishing\">Mobile Phishing Attack Techniques &amp; How to Prevent \u201cMishing\u201d\u00a0<\/h2>\n\n\n\n<p>The pandemic has revolutionized the way we communicate. Gone are the days when we had to get off the couch to talk with coworkers and employees. Nowadays, you just need access to a cell phone to Zoom, send emails, and schedule meetings. This convenience comes at a price, though.<\/p>\n\n\n\n<p>With over 15 billion cell phones in the world, it\u2019s no wonder that malicious actors turn to mobile devices to steal data and private information. Remote work and BYOD cultures have paved an even easier path for hackers to target enterprise employees. One of the most damaging attacks: mobile phishing or \u201cmishing\u201d.<\/p>\n\n\n\n<p>Phishing attacks have been around since the mid-1990s when they originally targeted&nbsp;emails. Today, they&#8217;re more sophisticated and becoming more prevalent on mobile devices. The high frequency at which mobile phishing attacks occur means more work for <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">security operations center (SOC) teams<\/a> to manage. Continue reading to learn more about the growing threat of mobile phishing and how to handle it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Mobile Phishing?<\/h2>\n\n\n\n<p>Mobile phishing is a type of phishing attack that uses mobile devices, such as smartphones and tablets, to deliver malicious content. Historically, phishing attacks have been conducted through email messages and web pages. However, as the internet has become increasingly mobile-friendly and people are spending more time on their phones than ever before (for example, Americans spend almost <a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/americans-spent-a-third-of-waking-hours-on-mobile-devices-in-2021-report-finds\/\" target=\"_blank\" rel=\"noopener\">4.8 hours a day on their smartphones<\/a>), cybercriminals have turned their attention to this new avenue for victimizing users.<\/p>\n\n\n\n<p>Mobile phishing attacks may be harder to detect because they extend beyond regular email phishing. SMS-based attacks (smishing), malicious voice calls (vishing), and app-based phishing have exploded in popularity \u2013 and severity. And they&#8217;re harder to defend against because they&#8217;re designed specifically for mobile devices and rely on your trust in legitimate apps you already use regularly:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p dir=\"ltr\">SMS\/text messaging \u2013 phishing texts commonly impersonate banking apps, shipping providers, and <a href=\"https:\/\/cnycentral.com\/news\/local\/boss-scam-employees-targeted-with-texts-and-emails-during-pandmic\" target=\"_blank\" rel=\"noopener\">even your CEO<\/a>.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Voice mails \u2013 it\u2019s more than your car\u2019s extended warranty, vishing attacks will mimic the IRS, loan providers, and more.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Facebook Messenger \u2013 beware of suspicious links in messages, <a href=\"https:\/\/cybernews.com\/security\/we-uncovered-a-facebook-phishing-campaign-that-tricked-nearly-500000-users-in-two-weeks\/\" target=\"_blank\" rel=\"noopener\">even from your Facebook Friends<\/a>.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">WhatsApp \u2013 attacks can target victims <a href=\"https:\/\/faq.whatsapp.com\/1419898338168991\/?locale=en_US\">within the app<\/a> and <a href=\"https:\/\/tech.co\/news\/whatsapp-phishing-scam-steals-info\">via email<\/a>.<\/p><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-different-techniques-for-mobile-phishing-attack\"><figure><img decoding=\"async\" data-image=\"233272\" style=\"opacity: 1;\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/Types-of-Mobile-Phishing-1.gif\"><\/figure>Different Techniques for Mobile Phishing Attack<\/h2>\n\n\n\n<p>Mobile phishing strategies employ deceitful techniques to trick users on mobile devices into divulging sensitive information. The most common methods include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">URL Padding: Cybercriminals use domains within lengthy URLs, hiding malicious sites.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Tiny URLs: Attackers use shortened links for SMS phishing (smishing) in large-scale attacks.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Screen Overlays: Phishing apps mimic mobile apps to steal user authentication credentials, especially targeting mobile banking and payment apps.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Mobile Verification: Phishing sites check the device type to deploy mobile-specific attacks.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">SMS Spoofing (OTA): Fake text messages appear as system updates, tricking users into clicking links that may intercept data.<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">These tactics exploit mobile device vulnerabilities, making users more susceptible to phishing techniques over the phone.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mishing-vs-phishing\">Mishing vs Phishing<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The difference between mobile phishing and traditional phishing is the delivery. While traditional phishing emails are sent through email, mobile phone phishing takes advantage of the fact that many people use their phones for banking, shopping, and business. This expanded attack surface includes text messaging, phone calls, voice mails, apps, and social media platforms. While the delivery maybe be the main difference, there are other key elements to consider as well.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-rise-of-cell-phone-phishing\"><strong>The Rise of Cell Phone Phishing <\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p dir=\"ltr\"><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/security-awareness-training\/2022-state-phish-explores-increasingly-active-threat-landscape\" target=\"_blank\" rel=\"noopener\">74% of companies<\/a> faced smishing attacks last year.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">In 2021, 61% of surveyed companies dealt with social media phishing attacks.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><a href=\"https:\/\/purplesec.us\/resources\/cyber-security-statistics\/#MobileSecurity\" target=\"_blank\" rel=\"noopener\">51% of organizations<\/a> allow employees to access corporate applications on their personal mobile devices.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Phishing attacks on mobile devices have grown at a consistent rate of 85% annually.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">42% of organizations report that vulnerabilities in mobile devices and web applications have led to a security incident.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">75% of the phishing sites specifically targeted mobile devices.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">There are almost 75x more phishing sites than malware sites on the internet, according to <a href=\"https:\/\/transparencyreport.google.com\/safe-browsing\/overview?unsafe=dataset:1;series:malware,phishing;start:1579219200000;end:1611791999999&amp;lu=unsafe\" target=\"_blank\" rel=\"noopener\">Google Safe Browsing<\/a>.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">The Bank of Ireland was <a href=\"https:\/\/www.irishtimes.com\/business\/financial-services\/bank-of-ireland-does-u-turn-after-refusal-to-reimburse-smishing-victims-1.4326502\" target=\"_blank\" rel=\"noopener\">forced to pay out \u20ac800,000<\/a> to 300 bank customers as the result of a single smishing attack.<\/p><\/li>\n\n\n\n<li>In 2024, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/82-phishing-target-mobile-devices\/\">80% of phishing sites <\/a>now specifically target mobile devices, showing a significant rise in mobile-focused attacks.<\/li>\n\n\n\n<li>The average cost of a successful mobile phishing attack on a business is <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">now $4.5 million<\/a>.<br><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-your-mobile-phishing-protection-checklist\">Your Mobile Phishing Protection Checklist<\/h2>\n\n\n\n<p>Mobile phishing scams happen around the clock, so make sure your defense is always ready. Here are a few areas to consider for your phishing defense and response:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><p dir=\"ltr\"><strong>Educate Employees: <\/strong>Prevention is your best defense. Ensure that mobile phishing safety is included in regular employee security training. Highlight common red flags and real-life examples so that employees know what to look out for. Establishing a security-first culture within your organization can reduce the number of successful phishing attacks.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Collect Evidence<\/strong>: Encourage employees to send screenshots of any malicious texts, messages, and emails from the targeted mobile device (and remind them to block the sender). If an employee falls victim to a phishing attempt, it\u2019s critical to know what the successful attack looked like.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Analyze Data:<\/strong> Your security team can quickly identify attack trends once enough data is collected. For instance, if you notice an uptick in smishing attacks that impersonate the CEO, that is a great opportunity to send out company-wide security alerts.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Have an <a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\">Incident Response Plan<\/a>: <\/strong>Did an employee click a bad link or share private information? Then it\u2019s go time \u2013 activate your IR procedures. Make sure that your team has documentation of what steps to follow: anything from quarantining devices, to searching internal systems, to reviewing logs for other affected users.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Establish a BYOD Policy: <\/strong>Creating a <a href=\"https:\/\/www.dialpad.com\/blog\/byod-policy\/\" target=\"_blank\" rel=\"noopener\">Bring Your Own Device<\/a> policy is a necessity, whether in-office, hybrid, or remote. Include parameters around <a href=\"https:\/\/swimlane.com\/blog\/employee-onboarding-offboarding-automation\" rel=\"noopener\">employee offboarding<\/a>, device loss, theft, and device updates.<\/p><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-triage-phishing-with-modern-tools-security-automation\">Triage Phishing with Modern Tools:\u00a0<br>Security Automation<\/h2>\n\n\n\n<p>Mobile phishing attacks will continue to grow in frequency and sophistication. Remote work and our reliance on mobile devices will fuel these attacks even more. And with security teams receiving thousands of alerts daily, leaders are on the search for options to stay ahead of phishing threats.<\/p>\n\n\n\n<p>Security automation platforms offer solutions to combat the rise of mobile phishing attacks. <strong>Benefits of automation include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p dir=\"ltr\">Save SOC analyst time with automatic investigation and quarantine<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Gain visibility into phishing attempts from the dashboard<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Block false positives with entirely automated workflow<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Increase efficiency with real-time case collaboration<span style=\"font-family: -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, &quot;Helvetica Neue&quot;, Arial, &quot;Noto Sans&quot;, sans-serif, &quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, &quot;Segoe UI Symbol&quot;, &quot;Noto Color Emoji&quot;; font-size: 1rem;\"><\/span><\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Improve security metrics, such as reducing mean time to resolve (MTTR)<\/p><\/li>\n<\/ul>\n\n\n\n<p>The purpose of adding automation is to empower SOC teams to stop more threats faster. These platforms automate the repetitive, mundane tasks that suck time away from SOC analysts.<\/p>\n\n\n\n<p>Whether you introduce security automation into your SOC or establish a manual IR process, mobile phishing needs to be on your threat radar. Educate employees, secure the growing attack surface, and have a thorough incident response process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common FAQs around Mobile Phishing<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">How to look up for mobile phishing numbers?<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">You can search for mobile phishing numbers by using online reverse phone lookup services or mobile apps designed to identify and report spam or phishing calls. These types of services can help you identify if a number has been reported for suspicious or fraudulent activity.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Can phishing be done by iPhones?<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Phishing attacks can target iPhones. Phishing attacks rely on social engineering techniques to deceive users, regardless of the device they&#8217;re using. iPhones can also receive phishing emails, text messages, or encounter phishing websites. It&#8217;s important to be cautious and follow best practices for online security.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Can phishing hack your phone?<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Phishing can lead to the compromise of your phone. Phishing attacks aim to trick users into revealing personal information or downloading malicious software. If they&#8217;re successful, these attacks can lead to data theft, unauthorized access, or control of your device.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is mishing in cyber security?&nbsp;<\/h3>\n\n\n\n<p>Mishing (mobile phishing) is a cyberattack where scammers use SMS or messaging apps to trick users into revealing sensitive information, clicking malicious links, or downloading malware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What other types of phishing attacks can you encounter on mobile devices?<\/h3>\n\n\n\n<p>Besides mishing, mobile users may face:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Smishing<\/strong> \u2013 SMS\/text-based phishing<\/li>\n\n\n\n<li><strong>Quishing<\/strong> \u2013 QR code-based phishing<\/li>\n\n\n\n<li><strong>Vishing<\/strong> \u2013 Voice call phishing<\/li>\n\n\n\n<li><strong>App-based phishing<\/strong> \u2013 Malicious apps stealing data<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">How is mobile phishing security different from computer and laptop?<\/h3>\n\n\n\n<p>Mobile phishing exploits SMS, messaging apps, and QR codes, making it harder to detect than traditional email phishing. Mobile devices also have smaller screens and limited security tools, increasing the risk of accidental clicks on malicious links.<\/p>\n\n\n\n<div class=\"bs-div bs-div-c8148c888bbaebdf14e7ea66139627e7ff0e5912 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-c8148c888bbaebdf14e7ea66139627e7ff0e5912 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_playbook_Add-panel-filter_search-3-1.gif' class='img-fluid'   alt='Animated GIF showing Swimlane Turbine playbook interface with advanced panel filtering and automated logic search.' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_playbook_Add-panel-filter_search-3-1.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-see-swimlane-turbine-in-action\">See Swimlane Turbine in Action <\/h2>\n\n\n\n<p>Schedule a Swimlane Turbine live demonstration with our experts! Learn how our AI-enabled security automation platform can help you solve the most challenging problems across your entire security organization.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-e52e6a3adbf9cf51df90640dbdb61fdb3ba7c681\"><style>.bs-pro-button-p-btn-e52e6a3adbf9cf51df90640dbdb61fdb3ba7c681 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a Demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d077e124c7b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/5-enterprise-mobile-device-security-threats\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>11\u6708 30, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>5 Threats to Your Enterprise Mobile Device Security and How to Prevent Them<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d077e125cf7 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/soar-automated-phishing-investigation-and-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\u6708 26, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Don\u2019t Take the Bait: Automated Phishing Investigation and Response<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d077e126c38 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/four-automated-antiphishing-techniques\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\u6708 23, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Four Automated Anti-Phishing Techniques<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":46400,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":46401,"learn_more_label":"","image_alt_text":"Mobile Phishing Attack Techniques & How to Prevent Them","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,76,69],"class_list":["post-9383","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-security-automation","blog-category-learn","blog-category-use-cases"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile Phishing Attack Techniques &amp; How to Prevent Them<\/title>\n<meta name=\"description\" content=\"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Rise of Mobile Phishing and How to Prevent Mobile Phishing\" \/>\n<meta property=\"og:description\" content=\"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-26T17:10:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/\",\"url\":\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/\",\"name\":\"Mobile Phishing Attack Techniques & How to Prevent Them\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png\",\"datePublished\":\"2025-03-26T17:10:07+00:00\",\"dateModified\":\"2025-03-26T17:10:14+00:00\",\"description\":\"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png\",\"width\":1120,\"height\":666,\"caption\":\"Illustration of phishing attack on smartphone with password prompt and security shield icon.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Rise of Mobile Phishing and How to Prevent Mobile Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ja\/#website\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u306e\u624b\u53e3\u3068\u305d\u306e\u5bfe\u7b56","description":"\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u306e\u5897\u52a0\u3068\u3001\u30c7\u30d0\u30a4\u30b9\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306e\u5c02\u9580\u5bb6\u306e\u30d2\u30f3\u30c8\u306b\u3064\u3044\u3066\u8a73\u3057\u304f\u5b66\u3073\u307e\u3057\u3087\u3046\u3002\u5f53\u793e\u306e\u4e88\u9632\u30ac\u30a4\u30c9\u3067\u3001\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u306e\u8105\u5a01\u304b\u3089\u8eab\u3092\u5b88\u308a\u307e\u3057\u3087\u3046\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\/","og_locale":"ja_JP","og_type":"article","og_title":"The Rise of Mobile Phishing and How to Prevent Mobile Phishing","og_description":"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\/","og_site_name":"AI Security Automation","article_modified_time":"2025-03-26T17:10:14+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"7\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/","url":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/","name":"\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u306e\u624b\u53e3\u3068\u305d\u306e\u5bfe\u7b56","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png","datePublished":"2025-03-26T17:10:07+00:00","dateModified":"2025-03-26T17:10:14+00:00","description":"\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u306e\u5897\u52a0\u3068\u3001\u30c7\u30d0\u30a4\u30b9\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306e\u5c02\u9580\u5bb6\u306e\u30d2\u30f3\u30c8\u306b\u3064\u3044\u3066\u8a73\u3057\u304f\u5b66\u3073\u307e\u3057\u3087\u3046\u3002\u5f53\u793e\u306e\u4e88\u9632\u30ac\u30a4\u30c9\u3067\u3001\u30e2\u30d0\u30a4\u30eb\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u306e\u8105\u5a01\u304b\u3089\u8eab\u3092\u5b88\u308a\u307e\u3057\u3087\u3046\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png","width":1120,"height":666,"caption":"Illustration of phishing attack on smartphone with password prompt and security shield icon."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/mobile-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Rise of Mobile Phishing and How to Prevent Mobile Phishing"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9383\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/46400"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=9383"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=9383"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=9383"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=9383"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=9383"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=9383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}