Lookout Blog

September 10, 2014

Mobile 101: Expert tips for safely disposing of your old iPhone

Apple’s long-awaited iPhone announcement has consumers champing at the bit to get their hands on Apple’s latest device. For all those planning to bid farewell to their old iPhones and upgrade to the latest model on September 19, you’ll want to make sure that you give your old phone a proper scrub before disposing of it.

To ensure that all the personal data on your old phone doesn’t end up in the wrong hands, check out Lookout’s expert tips for safely disposing of an old phone:


September 9, 2014

Shopped at Home Depot lately? Here’s how to protect yourself in the wake of the data breach

Home Depot

If you used your credit card at a Home Depot store in the U.S. or Canada between April and about a week or so ago you really should read this post.

Home Depot has confirmed that its payment system was breached, which means that 60 million or more credit card numbers likely were stolen, according to The New York Times. (Last year’s Target breach impacted 40 million cardholders, so this could be the largest known breach to date.)

Read More

September 9, 2014

Want to learn about innovating enterprise mobile security? Listen to this talk

Jim Dolce CTIAWe’re really excited because today at CTIA’s Super Mobility Week, our CEO Jim Dolce will be giving a keynote on an issue near and dear to our hearts: Using innovation to help solve the enterprise mobile security problem.

Today, work and home life are merging, which means the days of the buttoned-up corporate network are over. The number of smartphones around the globe will continue to accelerate this year, growing to nearly 2.4 billion–up more than 25 percent year over year. And, of course, nearly 1 billion of those devices will find there way into the corporate environment by 2017.

The mobile device continues to change and reform the network perimeter.

Jim will touch on:

  • Why security investment needs to shift
  • Why the new big data approach is going to be the keystone of mobile security in the enterprise
  • Making it more expensive for the bad guys to evade detection

Watch the keynote live at 3:30pm PT here and leave your thoughts in the comments!

September 3, 2014

Uncovering how the recent celebrity image breach happened

This weekend close to 700 highly personal photos of more than 25 celebrities were leaked publicly.  We looked into the origins of this dump and the files inside it to shed some light into how they got there, particularly to understand how best to protect users against this sort of crime in the future.

Read More

September 2, 2014

3 ways to keep your Apple ID safe

By now you’ve probably heard about the celebrities whose “sexy” photos were leaked to the public after their Apple accounts were allegedly hacked.

But celebrities aren’t the only ones who store their photos in the cloud. We do, every day, along with a host of other types of data such as credit card numbers, medical records, personally identifiable emails, contacts, emails, and more. And celebrities certainly aren’t the only ones who put their trust in Apple’s services.

We’ve pulled together a list of tips for keeping your Apple accounts secure and other generally good practices when using the cloud!

August 28, 2014

Lookout is headed North! We’re opening an office in Toronto and want you

Lookout is getting its winter-wear ready because we’re opening an office in Toronto!

Run by Lookout’s Head of Security Tim Wyatt, we’re bringing our hacker mentality to Canada, focusing on the arm of our business that finds and tears down malware to keep your devices and data safe.

Read More

August 21, 2014

The stolen-data storefront: How your personal information is sold

You hear about stolen data often, but where does it all go? Stolen-data markets on the Internet have become institutionalized venues for back-room deals on hot credit card numbers, personally identifiable information, data “dumps,” and more.

It truly is a business, as was outlined by Thomas J. Holt, an associate professor with Michigan State University at this year’s Def Con, the world’s largest hacker conference. He, along with researchers Olga Smirnoav of Eastern Carolina University and Yi-Ting Chua of Michigan State University dove into 13 English and Russian-speaking stolen-data markets to understand how they tick.

Read More

August 19, 2014

Hey Boston, Lookout wants to hire you!

We’re on the hunt for more outstanding tech talent and, Boston, we like your style.

Lookout is opening a Boston office to tap what is arguably one of the richest pools of tech talent in the U.S. Boston’s startup scene is growing fast and the area’s technical universities continue to produce top-shelf talent. After raising $150 million from top investors such as T. Rowe Price, we’re excited to invest some of that money in Beantown, hiring the best people we can find to join our already deep bench of mobile and security talent.

Best part? We’re hiring today.

We’re committed to protecting the mobile ecosystem from the malware and unsavory behaviors that threaten consumers and enterprises alike. Lookout has over 50 million subscribers worldwide, which gives us an unrivaled footprint to gain a real-time view into the mobile threat landscape. There are tons of opportunities at Lookout to take your engineering skills to the next level, work on an awesome product experience, and actually fight the bad guys threatening your mobile devices and your precious data.

And we’re passionate about making Boston a center of this kind of innovation. It doesn’t hurt that our CEO Jim Dolce is a Boston native, who has direct experience hiring and working with the type of dynamic Boston talent we need to propel us through our next stage of growth.

Turns out Boston Mayor Martin J Walsh is also excited about this move. He gave us a warm welcome to the region:

“The academic roots of our city help attract the best and the brightest and I am committed to creating an environment where these innovative minds can thrive well after graduation,” said Mayor Martin J. Walsh. “The fact that companies like Lookout are setting up shop here is a testament to the success of our efforts to make Boston a truly attractive place for young technology companies to prosper. With that, I welcome Lookout to Boston.”

We’re planning to set up shop right in the middle of the financial district so whether you live in the city or are commuting in from the suburbs, we’re conveniently located.

Of course, that doesn’t mean we’re going to slow down our recruiting efforts in San Francisco. We’re continuing to call this place home and are committed to employing the best of the Bay Area.

Are you interested in working with us? Contact our recruiting team!

August 13, 2014

Getting down to business

Building on its Strong Consumer Momentum, Lookout Secures $150 Million to Extend its Reach into the Large Enterprise

It’s hard to believe that it’s been nearly five months since I took the helm here at Lookout as its new CEO.  Back then, I was intrigued by the prospect of working at the intersection of four key trends that are reshaping the way we think about technology, namely mobile, security, big data and cloud computing.  During my time here, I’ve often been asked, “What’s the biggest surprise you’ve encountered at Lookout?”  Simply put, the opportunity is even bigger than I initially understood it to be!

Today, I’m thrilled to announce that we’ve equipped ourselves to realize this opportunity with the closing of a $150 million round of financing led by investment funds managed by T. Rowe Price Associates with participation from new investors Morgan Stanley Investment Management, Wellington Management Company, LLP, Goldman Sachs and Bezos Expeditions.  We’re equally pleased that existing investors Mithril Capital Management, Khosla Ventures, Accel Partners, Index Ventures and Andreessen Horowitz are also participating.  The backing of these leading investors is a vote of confidence in our team and a strong endorsement of our business plan.

We intend to put this new capital to work at assembling the talent and technology needed to drive our consumer momentum while simultaneously extending our reach into the large enterprise market.  We will devote significant resources to product development and aggressively expand our sales and support organizations to market our solutions globally.

Read More

July 16, 2014

U.S. targeted by coercive mobile ransomware impersonating the FBI

FBI-warningLookout has discovered a highly concerning piece of malware that targets the U.S. The malware can render your phone inoperable, can cause loss of access to data, and otherwise attempts to extort you with a fairly scary message: you’re being investigated by the FBI, you’re a criminal.

We call this family ScarePakage. It masquerades as well-known apps, such as Adobe Flash and a number of anti-virus applications, and pretends to scan your phone upon launch. After completing the fake scan it locks your phone. You can’t navigate away and if you try to reboot, the fake FBI message will be the first thing you see when the phone turns on.

Read More