October 29, 2010

Lookout named on Top Tech Products 2010

Lookout is honored to be chosen as one of PCWorld’s Top 100 Tech Products of 2010! PCWorld’s list includes the cream of the crop across technology, and we are humbled to be listed among such great products like the Apple iPad (#2), Motorola Droid X (#25), Google Gmail (#41), and Facebook (#65). Our presence on this list is exciting and validating. Thank you to PC World and our users for helping us make this list.

Category:   Apple  •  Lookout News
October 29, 2010

Critical Adobe Flash Vulnerability for Android Announced

Today Adobe announced a critical vulnerability in Flash for Windows, Mac, Linux, Solaris, and Android that may allow an attacker to take control of your system.  Adobe tells us:

“A critical vulnerability exists in Adobe Flash Player and earlier versions for Windows, Macintosh, Linux and Solaris operating systems; Adobe Flash Player and earlier versions for Android; and the authplay.dll component that ships with Adobe Reader 9.4 and earlier 9.x versions for Windows, Macintosh and UNIX operating systems, and Adobe Acrobat 9.4 and earlier 9.x versions for Windows and Macintosh operating systems.”

Phones it affects:

Those running Adobe Flash Player and earlier for their Android (version 2.2) could be affected, although, Adobe is not currently aware of attacks targeting Adobe Flash Player.

How to tell if you’re affected:

You can check to see if Adobe Flash Player is installed on your Android device by opening the Settings application and navigating to Applications -> Manage Applications. Scroll down and click on Adobe Flash Player, if you are running or an earlier version, your device is vulnerable.

How to stay safe:

As stated in their advisory, Adobe plans to issue a fix for the issue and provide an update for Flash Player on Android by November 9, 2010. Until November 9th, you have options to stay safe:

(1)   Uninstall the Flash Player from your device until a patched version is available. To track when a patch is available you can subscribe to the Adobe PSIRT RSS feed.

(2)  Disable the plugin availability entirely, or set plugins to “On Demand” in the Android Browser. This will allow you to choose and select which flash content to open.  To set plug-ins to “On Demand”, click the browser icon on your device and navigate to Menu -> Settings. Scroll down and unclick the “Enable Plug-Ins” icon.

Stay tuned for more details on this vulnerability as more information presents itself.

Category:   Android  •  exploits  •  malware  •  Security  •  Uncategorized
October 27, 2010

Another Spyware App Makes an Appearance

Today the New York Times published an article about a new piece of spyware called Secret SMS Replicator. If the Secret SMS Replicator is installed on a mobile phone without the owner’s knowledge, it will automatically forward text messages sent from the phone to a designated phone number. Like other spyware apps, it has to be downloaded onto the phone (without the user’s knowledge) in order to work.  Fortunately the Secret SMS Replicator is  no longer available in the Android Market, and the Lookout Security Response Team has already released an over-the-air update to all Lookout users.

The best way to protect against spyware is to have a very strong password on your phone and always download apps from trusted sources.

Category:   Attacks  •  Security  •  spyware
October 21, 2010

Announcing Our New Website

Lately, we’ve been announcing a lot of exciting news including growing our community of users to more than 2 million, receiving a five star ranking from PC World, and being featured in our first national TV commercial with Verizon. As we evolve our business we want to ensure our website reflects our product design philosophy- simple, clean and easy to use. We’re excited to unveil our new website and would like to thank our rock-star design team Weightshift.

We continue to receive amazing feedback from our user community.  Keep it coming and let us know what you think of the new website. This is just one of several milestones in a series of exciting events to come, so stay tuned!

Category:   Uncategorized
October 18, 2010

Mobile becomes a key part of the security conversation

BusinessWeek regularly issues special reports that are a collection of stories centered on a particularly hot topic, and this week they chose to cover Cybersecurity. These days, you can’t have a conversation about security without covering the mobile aspect, so it’s no surprise that BusinessWeek dedicated a section to mobile security called Smartphone Apps Go (Truly) Viral. The reporter, Olga Kharif, points out that while mobile threats are currently not as common as PC threats, as proliferation of smartphones continues to exponentially increase, our phones are becoming more of a target for attackers.

As we begin to do more and more with our smartphones, we’ll see more attention being paid to securing these devices.

Category:   Attacks  •  Lookout News  •  Security
October 14, 2010

Wall Street Journal Features Lookout

Lookout was featured as one of the hot mobile companies making its home-base in San Francisco in the Wall Street Journal. We were honored to be mentioned next to other amazing tech companies like Zynga, Zendesk, Dropbox and Twitter.

We love the entrepreneurial environment in SOMA. Our team pours in from all parts of the Bay Area. We’ve have people commuting in on Caltrain or BART, others arriving from Pacifica and several biking in from all over San Francisco.

John said it best in the story, “San Francisco is absolutely becoming ground zero for mobile and Web start-ups.”

An afternoon at the Ball Park, just around the corner from our offices.

Category:   Lookout News
October 13, 2010

Third Variant of SMS Trojan Found

Earlier today, a third variant of the “FakePlayer” SMS Trojan was detected. On August 10th, we covered the initial “FakePlayer” SMS Trojan release and gave a thorough overview of how the Trojan works. Approximately one month later the first variant was released (covered here) with minor changes.

This new variant only has two major changes compared to the previous ones:

1)      The “PornoPlayer” icon from the initial Trojan made a return

2)      The third variant sends an SMS message to two numbers: 7132 and 4161.

If you are interested in more details on how this Trojan works, or are worried you may be affected, you can refer back to our previous posts.  With the discovery of these new Android Trojans, it is important to pay attention to what you’re downloading. This app directly lists permissions to access “Services that cost you money” before you install. Stay alert to ensure that you trust every app you download and stay tuned for more details on this threat.

Category:   malware
October 12, 2010

Mobile Security, a Hot Topic at CTIA

Last week Lookout’s CEO, John Hering, participated on an enterprise mobile security panel at CTIA, hosted by editors from the Ziff Davis family of publications: eWeek and CIO Insight.

It’s no surprise mobile security was a hot topic at CTIA this year. More employees want to use a personal device in the workplace, which brings with it both personal and enterprise security risks.  At the request of business users, enterprise IT teams have increasingly been forced to support multiple devices (iPhone, BlackBerry, Droid). According to Forrester Research, more than 33% of enterprises already support multiple phone operating systems. Long gone are the days where the IT department was able to mandate the type of phone from which an employee accesses work-related data.  These days, end-users are driving the conversation in enterprise mobile IT.  Increasingly consumers bring technology to IT and IT must decide how to handle it.

The panel covered a lot of great material, but what was most surprising was the laser focus on “corporate mobile applications” and hardly any mention of the personal apps users download. The enterprise community is not yet focused on the fact that employees download apps beyond “corporate mobile applications”.  Business users are downloading apps on their work phones for their personal use: game apps, social apps, location-based apps,  the list goes on.  As the panel conversation broadened to incorporate these apps and the security implications, everyone perked up.  IT managers can closely manage the corporate applications business users download, and do their best to ensure that data is not lost or stolen, but they cannot overlook the personal apps that employees will inevitably download and the potential impact they have on enterprise security.

We expect to hear a lot more about this topic in the next few months.  For all of you out there who use your phone for business and personal use, do your part and download apps responsibly. As always, only download apps from sites you trust, and read app reviews to see what other users have to say.

Stay tuned for our top tips for enterprises to consider in regards to mobile security!

Alicia is part of the marketing team at Lookout Mobile Security.

Category:   Enterprise Mobile Security  •  Lookout News  •  Security
October 6, 2010

Verizon Features Lookout in Droid Commercial

Mobile security is getting its prime-time debut with Verizon featuring Lookout in its latest Droid TV commercials. The commercial, which will air starting today, is the latest in the Verizon Droid campaign.

We love how it turned out and thanks to Verizon for choosing Lookout!

Category:   Lookout News  •  malware  •  Missing Device  •  Security
October 4, 2010

CTIA takes mobile security seriously

Mobile security is an important topic at CTIA this year and our CEO John Hering will be speaking on two panels there this week. If you’re at CTIA,  stop by our sessions.  The session information is as follows. 

Session: VC Portfolio Company Review
Date: 10/6/2010
Time: 11:00 AM to 12:45 PM
Location: Moscone Center West – Room 2002
Click here for more info

Session: eWeek Presents: Mobile Security in the Enterprise: Filling in the missing pieces.
Date: 10/7/2010
Time: 11:00 AM – 1:00 PM
Location:  Moscone Center West
Click here for  more info.

We hope to see you there!

Category:   Uncategorized