| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

| Executives
January 18, 2018

Mobile Advanced Persistent Threat actor conducting global espionage campaign from Lebanon

Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a persistent and prolific actor running a global espionage campaign against military personnel, enterprises, medical...

View Article arrow_forward

| Executives
January 5, 2018

Spectre & Meltdown: How 2 of the largest vulns impact mobile

Spectre & Meltdown are arguably two of the biggest vulnerabilities in computing and certainly mobile history.

View Article arrow_forward

Latest Blogs


| Individuals
February 16, 2018
Over 3.6 million hacked in January healthcare breaches

In January, we saw a significant uptick in malicious activity from this same time last year. Throughout the month, we recorded twice as many breaches...

Read Morearrow_forward



| Executives
February 14, 2018
The single biggest misconception in government security today: federal agencies aren’t being attacked on mobile

Government agencies are being actively attacked on mobile, according to a new Lookout survey of 200 security and IT professionals. Today, 60.5% of...

Read Morearrow_forward


See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market.

Learn Morecall_made


| Executives
February 5, 2018
Cloud-first, device assisted: A layered defense model

Stopping these malicious actors requires the kind of long view, holistic effort that Lookout has employed with its unique "cloud-first, device...

Read Morearrow_forward



| Executives
February 2, 2018
Mobile Threat Defense: The drawbacks of “on-device” MTD solutions

MTD vendors take different approaches to evaluating indicators of threats or risks on a mobile device. The philosophy behind these approaches can...

Read Morearrow_forward



| Individuals
January 25, 2018
2017: Attackers breached over 5B accounts from companies like Equifax, Boeing, and Anthem

Cyber criminals did not slow down in 2017. We tracked 132 breaches in the last year to some massive and well known companies like Google, Uber,...

Read Morearrow_forward



| Executives
January 18, 2018
Mobile Advanced Persistent Threat actor conducting global espionage campaign from Lebanon

Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a persistent and prolific actor running a global espionage campaign...

Read Morearrow_forward



| Executives
January 10, 2018
The mAPT has arrived

Mobile has emerged as a key component of the Advanced Persistent Threat arsenal. These "mAPTs" take advantage of the smartphone's features and...

Read Morearrow_forward



| Researchers
January 10, 2018
Mobile APT (mAPT) SpyWaller re-emerges, may include Western targets

Lookout has discovered new variants of the SpyWaller surveillanceware with advanced espionage capabilities. The variants now target Facebook...

Read Morearrow_forward



| Executives
January 5, 2018
Spectre & Meltdown: How 2 of the largest vulns impact mobile

Spectre & Meltdown are arguably two of the biggest vulnerabilities in computing and certainly mobile history.

Read Morearrow_forward



| Executives
January 4, 2018
[Infographic] New survey indicates mobile risks are high, visibility is low

A new study from CSOonline.com and Lookout reveals that while most IT and business leaders believe that mobile threats and risks to corporate data...

Read Morearrow_forward