| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

Latest Blogs


| Researchers
June 4, 2019
New adware "BeiTaAd" found hidden within popular applications in app store

BeiTaAd is a well-obfuscated advertising plugin hidden within a number of popular applications in Google Play. The plugin forcibly displays ads on...

Read Morearrow_forward



| Researchers
May 29, 2019
Too close to home: local businesses targeted by phishing attacks

Lookout Phishing AI has detected a phishing campaign impersonating local government websites, including the City of San Mateo, City of Tampa, and...

Read Morearrow_forward


logo

See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market for the second year in a row.

Learn More


| Executives
May 14, 2019
PSD2 compliance is coming: do you have mobile app security for your payment apps?

The security requirements mandated by the Revised Payment Services Directive (PSD2) directive create the need for stronger authentication and secure...

Read Morearrow_forward



| Researchers
May 9, 2019
Mobile phishing protection: how to defend against https phishing attacks

Https phishing attacks may be common and hard to spot, but with Lookout deployed, enterprises have comprehensive mobile phishing protection --...

Read Morearrow_forward



| Executives
April 23, 2019
Helping higher education tackle today’s cybersecurity challenges

The perimeter has fully disappeared, and thankfully there are solutions that allow higher education institutions to safely and securely leverage...

Read Morearrow_forward



| Executives
April 15, 2019
Lookout partners with Trustonic to bring enhanced mobile security to payment and banking applications

Lookout Application Defense and Trustonic Trusted Execution Environment provides customers with protection from cyberthreats targeting banking,...

Read Morearrow_forward



| Researchers
April 9, 2019
Commercial spyware has a new name: stalkerware

Stories about surveillance tools like Pegasus and Dark Caracal’s Pallas are memorable because they tell the story of a severe privacy threat with...

Read Morearrow_forward



| Researchers
April 8, 2019
Lookout discovers phishing sites distributing new iOS and Android surveillanceware

For the past year, Lookout researchers have been tracking Android and iOS surveillanceware, that can exfiltrate contacts, audio recordings, photos,...

Read Morearrow_forward



| Executives
April 4, 2019
What is Lookout Continuous Conditional Access?

To create trust for devices in a post-perimeter world, Lookout Continuous Conditional Access works behind the scenes, dynamically monitoring the...

Read Morearrow_forward



| Researchers
April 1, 2019
Phishing AI discovers new mobile-first phishing campaign

Lookout Phishing AI reports a new, sophisticated phishing kit designed for mobile users targeting Verizon customers.

Read Morearrow_forward