Since mobile devices are essentially computers, it didn’t take long to figure out they needed to be protected like computers. That’s especially true given how frequently users download apps from the app store onto their mobile devices.

One example of mobile protection is Google Play Protect. Google Play Protect is Google’s built-in malware protection for Android devices. When you download an app from the Google Playstore, Google Play Protect automatically scans your device and makes sure your apps and everything else are safe. Sounds pretty good.

Users place a lot of trust in Google Play Protect, and unfortunately, that trust is being used against you to get you to lower your defenses to a phishing attack. According to a recent article on Bleeping Computer, “Android users are targeted in a phishing campaign that will infect their devices with the Anubis banking Trojan that can steal financial information from more than 250 banking and shopping applications. The campaign uses a devious method to get the potential victims to install the malware on their devices: it asks them to enable Google Play Protect while actually disabling it after being granted permissions on the device.”

Did you catch that? Google Play Protect is enabled by default. So, when the hackers ask you if you want to enable it, they are actually disabling it, which means you’re no longer protected. Somewhere in every successful phishing attack, the victim has to be tricked into cooperating with the hacker.

Continuing from the article, “once the Android smartphone or tablet is compromised, Anubis will start harvesting a list of installed applications to compare the results against a list of targeted applications. Once an application has been identified, Anubis overlays the original application with a fake login page to capture the user’s credentials.” You almost don’t have a chance. Almost.

Sophisticated attacks like these, especially against mobile devices, are why you need email security like that available from Phish Protection. Phish Protection is cloud based. Why is that important? It’s important because it means all your emails are first sent to Phish Protection to be scanned for malicious content before they ever reach your inbox. And it also means it protects ALL of your devices, including all of your mobile devices.

Phish Protection requires no hardware, no software and no maintenance. It sets up in 10 minutes and works with all email services. Try it risk free for 30 days and you won’t have to worry about how clever hackers are.

Please Enter Your Business Email Below to Continue

Get Free Access to Phishing Protection Best Practices

  • Learn why hosted solutions like Office 365 are vulnerable to phishing.
  • Discover why you must protect both your employees AND your customers.
  • Read why checking reputation databases once a day is a waste of time.
  • Learn what real-time website scanning should look for.
  • Get strategies for saving time and money on email protection.

Sign Up Below... and Get Instant Access to the Report