Cybercriminals are evolving—and they’ve set their sights on your smartphone.
For years, companies focused heavily on email phishing. Employees were trained to hover over suspicious links and think twice before clicking. But while security leaders were busy shoring up inbox defenses, attackers moved on.
The new frontline is mobile. And the new weapon of choice? Artificial intelligence.
In a recent conversation I had with Jim Dolce, CEO of Lookout, we unpacked some eye-opening results from the company’s latest research. The 2025 Lookout Mobile Threat Landscape Report and an independent survey of over 500 security professionals reveal a dangerous disconnect: while 84% of security leaders are confident in their ability to prevent mobile phishing attacks, only 31% of organizations have actually deployed a mobile security solution.
That’s not a confidence gap. That’s a confidence cliff.
The Rise of AI-Driven Vishing and Smishing
Email is no longer the main attack vector. Voice phishing (vishing) and SMS phishing (smishing) are now the preferred tools of attackers—and they’re smarter, faster, and more convincing than ever.
Jim shared a chilling example. His team used AI to clone his voice, then built an interactive vishing attack in under 20 minutes. The deepfake voice called an employee, pretended to be Jim, and pressured them into clicking a malicious link. After marginal initial results, the team adjusted the tone—sounding more frustrated and urgent—to increase the pressure.
It worked. The employee responded just like many others would.
Now imagine that happening at scale.
Meanwhile, smishing attacks are ditching the links entirely. Messages that read like “Hey, are you around?” or “Still good for dinner?” are crafted to pull you into a conversation and lower your guard. And according to Lookout, more than one-third of all mobile phishing attempts occur over text or messaging apps, not email.
Why Mobile Is Uniquely Vulnerable
Let’s be honest: mobile makes us easier targets.
You don’t inspect links the same way on your phone. You don’t verify senders as easily. And most employees simply aren’t trained to question a text message or a voice call the way they are an email.
The Lookout survey found that 87% of IT leaders acknowledge mobile devices are as vulnerable—if not more so—than laptops and desktops. And yet, those same leaders often assume existing endpoint protections are enough. They aren’t.
Mobile phishing bypasses traditional defenses. And because voice and messaging live on mobile devices—not desktops—email-focused tools like secure gateways and endpoint agents leave major gaps.
You Can’t Train Your Way Out of This
Yes, training helps. But attackers are using AI to outpace even the best training programs. They’re exploiting human behavior—trust, urgency, fear—and customizing attacks in real time.
As Jim pointed out, the only way to fight AI is with AI.
New technologies can now analyze just a few seconds of voice to detect deepfakes. Machine learning models can assess the intent of a text message—even if it doesn’t contain a link—and block it before the recipient ever sees it.
This is what’s needed now.
One Recommendation for CISOs
I asked Jim, “If he had to pick one thing CISOs should do today to close the mobile security gap, what would it be?” He responded that they need to stop treating mobile as an extension of desktop strategy.
Lookout’s data shows that 65% of mobile phishing attempts happen outside of email. That means your email security tools aren’t catching them. It also means mobile-specific protections—ones designed for SMS, voice, and apps—are no longer optional.
Adapt or Be Deceived
Attackers have moved on. They’re no longer relying on malware or spammy links. They’re using AI to sound like your boss, text like your coworker, and trick your employees into handing over the keys to the kingdom.
The Lookout report confirms what security professionals need to hear: mobile is the new frontline. If your defenses haven’t caught up, it’s not a matter of if you’ll be compromised—but when.
- AI Voice Clones and Mobile Phishing: The Cyber Threats You’re Not Ready For - July 11, 2025
- Rethinking Cloud Security for the Evolving Threat Landscape - July 11, 2025
- Why Data Security Is the Real AI Risk - June 30, 2025