April 29, 2016

Security week-in-review: Mobile phone thief thwarted by “Theftie”

Screen Shot 2016-04-29 at 2.24.06 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a thefties, Firefox vulns, and a warning: don’t upload your Slack credentials to Github! Check back every Friday to learn about the latest in security news.

Read More

April 22, 2016

Security week-in-review: Attackers phish iPhone users, pretending to be Apple Support

Screen Shot 2016-04-22 at 1.39.46 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore iPhone phishing scams, unpatched Android versions, hacking 60 Minutes reporters, and more. Check back every Friday to learn about the latest in security news.

Read More

April 21, 2016

Using spoofed Wi-Fi to attack mobile devices

Screen Shot 2016-04-20 at 10.36.23 AM

Does the screen above look familiar? It should. Millions of people around the world connect to public Wi-Fi networks on their mobile devices as they travel and seek their regularly scheduled Internet.

The problem is, not all networks are official. The image above is that of a fake, or spoofed, hotel Wi-Fi network; one created by Lookout for a demonstration on 60 Minutes.

Connecting to the network meant that the victim, in this case 60 Minutes’ reporter Sharyn Alfonsi, no longer had control over her data.

Read More

April 21, 2016

How we were able to spy on a 60 Minutes reporter

Screen Shot 2016-04-20 at 11.28.38 AM

Without apps, our mobile devices would be, well, phones. Apps are what take our devices to the next level, making them ultimately an assistant to our everyday activities.

However, malicious applications represent one of the main ways mobile devices are able to be compromised.

We demonstrated an example of what can happen if a malicious app infects a mobile device on 60 Minutes.

Read More

April 17, 2016

Can a phone be hacked? Watch Lookout on 60 Minutes

Screen Shot 2016-04-17 at 5.34.59 PM

Interested in getting more in-depth information on our attacks? Read about how we did the Wi-Fi attack here and the mobile malware attack here

Tonight, 60 Minutes featured Lookout co-founder John Hering and a number of other well-known and respected security researchers demonstrating mobile attacks.

Read More

April 15, 2016

Security week-in-review: Bricking, Blackholes, and bugs

6982098493_ec7ca07b53_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a bug that could brick an iPhone, what the White House is doing to get smarter about security, vulnerabilities, and more. Check back every Friday to learn about the latest in security news.

Read More

April 8, 2016

Security week-in-review: Think twice if your CEO asks you for money

8136629475_f6f0b408b3_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a warning from the FBI, a quick fix from Apple for an iPhone vulnerability, and more. Check back every Friday to learn about the latest in security news.

Read More

April 7, 2016

Straight to costs: What a mobile data breach will do to your bottom line

For the past four weeks Lookout has dived into a number of key findings straight from the mouths of security and IT professionals you work with every day. This is week four. Check out all of the blogs in the series:

  1. Week 1: Mobile devices — frequently a part of broader cyber attacks
  2. Week 2: It’s 9am, do you know where your data is?
  3. Week 3: How global enterprises are protecting themselves against mobile attack
  4. Week 4: Straight to costs: What a mobile data breach will do to your bottom line

With the average cost to triage a mobile malware infection at $9,485, IT and security departments could spend a total of $26.4 million annually.

At any given point in time, 3% of mobile devices are infected by malware, according to a 2016 study from The Ponemon Institute. An average enterprise could spend up to 13% of its total IT budget on triaging mobile malware infections alone.

Read More

April 1, 2016

Security Week-in-Review: Attacked by a state sponsor in Gmail? Google will tell you

Screen Shot 2016-04-01 at 3.52.40 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we talk about a yet another hospital’s computer systems held by ransomware, special Gmail warnings, and a vulnerability in Instagram. Check back every Friday to learn about the latest in security news.

Read More

March 25, 2016

Security Week-in-Review: Holding a hospital crypto-ransom

 

Open door of a working operating room

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we talk about a Verizon breach, illicitly selling passwords, a hospital’s systems held under crypto-ransom, and more. Check back every Friday to learn about the latest in security news.

Read More