UK-based cybersecurity services provider Netcraft on Monday announced the launch of a new mobile application designed to protect users against phishing and other threats.
Netcraft has pointed out that the mobile versions of popular web browsers don’t provide the same level of protection against phishing attacks as the desktop versions. According to the company, a study it carried out last year showed that browsers running on Android and iOS devices blocked a “tiny fraction” of the malicious sites blocked by their desktop versions.
The app it has developed, named Netcraft Phishing and Malware Protection, is designed to prevent users from accessing malicious websites based on data from the company’s anti-phishing feed.
Launched in 2005, Netcraft’s anti-phishing system is powered by a database of more than 56 million unique phishing websites. The database, which is constantly growing based on reports from its users, is utilized by all major web browsers and licensed by many companies specializing in security, content filtering, and web hosting.
The new mobile app works with several browsers, including Chrome, Firefox, Opera, Edge, UC, and the Samsung browser. Additionally, it protects users against threats in the Facebook, Instagram, Messenger, Twitter, Snapchat, Slack, Reddit and other apps.
The application is designed to block phishing and malware sites when users browse the web, and alerts the user when a phishing URL is detected in an SMS message. Users are provided information on the number of blocked threats.
The Android version of the app is currently on Google Play and it should become available in the Amazon Appstore shortly. An iOS version is also expected to be released soon.
The app can be used for free for 28 days, after which users can acquire a monthly or annual subscription. The app can be used for free to report phishing attacks to Netcraft.
Related: Phishing Training is a Tool, Not a Solution
Related: Phishers Use Zero-Width Spaces to Bypass Office 365 Protections
Related: Latest Phishing Technique Uses Fake Fonts to Evade Detection
Related: Office 365, Outlook Credentials Most Targeted by Phishing Kits

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
