| Executives

For CIOs, CISOs, technology professionals, and business leaders

View Articles arrow_forward

| Researchers

For security researchers and others in the InfoSec community

View Articles arrow_forward

| Individuals

For anyone interested in protecting their personal device and data

View Articles arrow_forward

| Executives
January 5, 2018

Spectre & Meltdown: How 2 of the largest vulns impact mobile

Spectre & Meltdown are arguably two of the biggest vulnerabilities in computing and certainly mobile history.

View Article arrow_forward

| Executives
January 4, 2018

[Infographic] New survey indicates mobile risks are high, visibility is low

A new study from CSOonline.com and Lookout reveals that while most IT and business leaders believe that mobile threats and risks to corporate data are a real problem, their visibility into these...

View Article arrow_forward

Latest Blogs


| Executives
January 10, 2018
The mAPT has arrived

Mobile has emerged as a key component of the Advanced Persistent Threat arsenal. These "mAPTs" take advantage of the smartphone's features and...

Read Morearrow_forward



| Researchers
January 10, 2018
Mobile APT (mAPT) SpyWaller re-emerges, may include Western targets

Lookout has discovered new variants of the SpyWaller surveillanceware with advanced espionage capabilities. The variants now target Facebook...

Read Morearrow_forward


See why Lookout is positioned as a Leader in the IDC MarketScape for the Mobile Threat Management security software market.

Learn Morecall_made


| Executives
January 5, 2018
Spectre & Meltdown: How 2 of the largest vulns impact mobile

Spectre & Meltdown are arguably two of the biggest vulnerabilities in computing and certainly mobile history.

Read Morearrow_forward



| Executives
January 4, 2018
[Infographic] New survey indicates mobile risks are high, visibility is low

A new study from CSOonline.com and Lookout reveals that while most IT and business leaders believe that mobile threats and risks to corporate data...

Read Morearrow_forward



| Researchers
December 20, 2017
3 fake Bitcoin wallet apps appear in (and are quickly removed from) Google Play Store

Lookout has identified three Android apps disguised as bitcoin wallet apps, previously in the Google Play Store, that trick victims into sending bitcoin payments to attacker-specified bitcoin addresses.

Read Morearrow_forward



| Individuals
December 19, 2017
Why the Uber breach matters even if you’re not a customer

As the size and impact of breaches accelerates, individuals need to stay on top of breach notifications even more than ever. Unfortunately, you can’t always rely on the breached company to tell you everything you need to know.

Read Morearrow_forward



| Executives
December 12, 2017
Understanding the real value of machine learning in mobile security

When done correctly, ML helps organizations defend against new, novel, and increasingly sophisticated mobile threats. Yet with all the attention,...

Read Morearrow_forward



| Executives
December 11, 2017
Why government should embrace personal technology, not ban it

The recognition that mobile devices are insecure is a step in the right direction, but I have to wonder, is a ban the answer?

Read Morearrow_forward



| Executives
November 29, 2017
The evolving mobile threat landscape

Failure to properly secure the mobile device, however, could result in data loss, significant infringement fines, and brand reputation damage. Unfortunately, it's fairly common for employee to use a smartphone at work that has access to vital...

Read Morearrow_forward



| Researchers
November 16, 2017
Tropic Trooper goes mobile with Titan surveillanceware

Learn about Titan, a family of sophisticated Android surveillanceware apps surfaced by Lookout's automated analysis that, based on command and control infrastructure, is linked to the same actors behind Operation Tropic Trooper.

Read Morearrow_forward