May 20, 2016

Security Week-in-Review: Popular apps have holes, too

8009146113_4d3c42df55_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore Android banking trojans, brute force attacks, and clickjacking schemes. Check back every Friday to learn about the latest in security news.

Read More

May 19, 2016

Think like a thief: safeguard your most personal device from loss or theft

Week1_Infographic_FINAL_600px

Read More

May 16, 2016

The house always wins: Takedown of a banking trojan in Google Play

Screen Shot 2016-04-25 at 8.03.58 AM

You always take your chances when you gamble, but with this Android malware, the odds are very much against you.

Lookout recently identified an app called “Black Jack Free” in the Google Play store, which turned out to be a variant of the malware family Acecard. The app has since been removed from the store. Because we previously issued coverage for this malware family months ago, all Lookout customers — individuals and enterprises — are safe. Non-Lookout customers who downloaded Black Jack Free (com.bjack.free) should immediately remove the app from their device and change the passwords to their sensitive accounts. This malware also attempts to download and install a secondary app called Play Store Update (cosmetiq.fl). This app should also be removed.

Read More

May 13, 2016

Security Week-in-Review: Old software, new problems

Screen Shot 2016-05-13 at 4.13.48 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore money-stealing malware, an SAP vulnerability from 2010, and patches. Check back every Friday to learn about the latest in security news.

Read More

May 6, 2016

Security Week-in-Review: Bug hunter wins $10K at the tender age of 10

9515347364_0e2e159f48_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a young bug bounty hunter, the ADP breach, and the dangers of unpatched systems. Check back every Friday to learn about the latest in security news.

Read More

April 29, 2016

Security week-in-review: Mobile phone thief thwarted by “Theftie”

Screen Shot 2016-04-29 at 2.24.06 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a thefties, Firefox vulns, and a warning: don’t upload your Slack credentials to Github! Check back every Friday to learn about the latest in security news.

Read More

April 22, 2016

Security week-in-review: Attackers phish iPhone users, pretending to be Apple Support

Screen Shot 2016-04-22 at 1.39.46 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore iPhone phishing scams, unpatched Android versions, hacking 60 Minutes reporters, and more. Check back every Friday to learn about the latest in security news.

Read More

April 21, 2016

Using spoofed Wi-Fi to attack mobile devices

Screen Shot 2016-04-20 at 10.36.23 AM

Does the screen above look familiar? It should. Millions of people around the world connect to public Wi-Fi networks on their mobile devices as they travel and seek their regularly scheduled Internet.

The problem is, not all networks are official. The image above is that of a fake, or spoofed, hotel Wi-Fi network; one created by Lookout for a demonstration on 60 Minutes.

Connecting to the network meant that the victim, in this case 60 Minutes’ reporter Sharyn Alfonsi, no longer had control over her data.

Read More

April 21, 2016

How we were able to spy on a 60 Minutes reporter

Screen Shot 2016-04-20 at 11.28.38 AM

Without apps, our mobile devices would be, well, phones. Apps are what take our devices to the next level, making them ultimately an assistant to our everyday activities.

However, malicious applications represent one of the main ways mobile devices are able to be compromised.

We demonstrated an example of what can happen if a malicious app infects a mobile device on 60 Minutes.

Read More

April 17, 2016

Can a phone be hacked? Watch Lookout on 60 Minutes

Screen Shot 2016-04-17 at 5.34.59 PM

Interested in getting more in-depth information on our attacks? Read about how we did the Wi-Fi attack here and the mobile malware attack here

Tonight, 60 Minutes featured Lookout co-founder John Hering and a number of other well-known and respected security researchers demonstrating mobile attacks.

Read More