Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Four mobile cybersecurity threats to watch in 2022

By Justin Lie
mobile-security-freepik.jpg
February 14, 2022

Mobiles have become an extension of our arms. We use them for anything, and everything — from checking our heart rate to making sure a photo frame hangs straight. Over six billion people worldwide use smartphones, including 85% of Americans. In the U.S., mobile e-commerce spending topped $47 billion. 


In 2022, the online shopping industry — specifically mobile and social commerce — will continue to grow exponentially, and with it, fraud will follow. As more apps come to market with commerce capabilities, more functionalities will be introduced to make purchasing easier. And for fraudsters, this means more opportunities for abuse. The more services an app provides, the wider the attack surface and the harder it is to secure. Those looking to commit fraud are increasingly good at finding where the vulnerabilities lie and how to take advantage of them. And businesses continue to be behind the 8-ball when it comes to securing their assets fast enough.


We see four fraud trends that businesses need to be on the lookout for this year:


  1. Mobile app fraud. Lots of it. Period. It’s easy to defraud an app especially given the low barriers to entry. In 2020, a massive fraud operation used a network of devices to drain millions from online bank accounts at record speed. A single emulator spoofed over 8,000 devices. These malicious tools are so readily available we expect to see many more instances this year. To combat it, mobile apps need to dial up their anti-fraud efforts. If they don’t, they run the risk of being defrauded across every service they offer. 
  2. Cross-border fraud. Cross-border e-commerce transactions spiked to obscene levels in 2021, with consumers under lockdown. But where there is smoke, there is usually fire. Spikes in sales led to spikes in fraud. In 2021, more than 60% of U.S. and U.K. businesses reported issues with cross-border fraud, and global card not present fraud tripled to over $32 billion in the last few years. As travel start to recover, fraudsters will take advantage of travel-starved individuals. Fake accounts, websites, and apps to trick people into purchasing travel packages that don’t exist will start to pop up. In addition, two years of travel restrictions have left some travel accounts dormant, and it’s been easier for fraudsters to break into them and drain loyalty points or stored value. Businesses need to pay close attention to new patterns of activity and secure their platforms. 
  3. Account Take Overs (ATO). Battling ATOs is a never-ending game of whack-a-mole. Years of massive data breaches have made it easy for fraudsters to acquire user credentials. Data leaks continue to be on the rise. Breaches in 2021 surpassed those in 2020 by almost 20%. As a result, ATO attempts will start to surge even higher in the coming months. It’s not just the number of accounts being breached; it’s how. Advances in deepfake technology have led to more effective social engineering scams. Cybercriminals are also using A.I. and machine learning to engineer attacks. They are often bad bots as they mimic actual user login behavior and attempt thousands of user login attempts in seconds. 
  4. KYU vs. KYC. One (KYC) is about validating a customer’s identity in the fight against fraud. It’s an important check to stop identity theft or other financial crimes. The other (KYU) is about establishing broader protocols about a user’s behavior. It requires a more comprehensive approach to digital identity users, such as their device, behavioral biometrics, account activity, and more. This allows businesses to understand user intentions and motivations across the user lifecycle and keep up with cybercriminals. Businesses that are forward-focused will start to focus on KYU as a way to learn more about their user, specifically when it comes to spotting fraud.


Fraud isn’t going to slow down this year. The opportunities for criminals are endless, and their techniques are getting more sophisticated. Businesses can no longer cut corners, and they must prioritize monitoring risk where customers are spending the most time — on mobile phones. To combat and avoid attacks, businesses need to be aware of the latest tricks of the trade and speed up their defenses. Specifically, they need to prepare apps and implement countermeasures sooner rather than later, such as starting to profile risk and secure every user checkpoint. In 2022, the digital landscape will sprout new opportunities for everyone — the good and the bad. Those who get ahead of it will be on the winning side of the year. 

KEYWORDS: cyber security fraud detection mobile security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Justin lie, founder and ceo of shield

Justin Lie is the Founder and CEO of SHIELD. With over 20 years’ experience in the industry, he is one of the earliest pioneers of fraud prevention technology. While running a cross-border e-commerce business as a teenager, Lie created his own system to combat online fraudsters that were attacking his websites.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-frame

    Don’t Be Caught Unaware: Four Pieces of Cybersecurity Legislation to Watch

    See More
  • The Cyber 101 Discussion

    Five cyber threats to watch in 2021

    See More
  • cybersecurity

    Report reveals the 5 fraud threats to watch out for in 2024

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products

Events

View AllSubmit An Event
  • January 14, 2026

    Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

    The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing