January 29, 2013
As we transition to a world connected by mobile, the need to keep our most personal information safe becomes more critical. We recently distributed a nationwide Google Consumer Survey and found that 15% of respondents caught unauthorized parties looking at their phones, while 8% suspect that someone has tried.
But wait…you’re not off the hook just yet! On the flip side, 32% of people surveyed admitted to looking in someone else’s phone without permission.
It happens – and often times it’s harmless, but on the rare occasion that your phone lands in the wrong hands, it’s important that your phone and the information it carries is protected. More than half of people admitted to not having a passcode set on their phones, a critical and easy step in keeping prying eyes out.
January 28, 2013
This blog post is also featured as a guest blog post on the WEF blog.
The UK government recently admitted that foreign states hacked and attacked its national infrastructure, including the country’s gas, water and electricity supplies. National defense systems have also been targeted by cyberwar. The most well-known instance being Stuxnet, malware designed to sabotage Iran’s nuclear program, discovered back in 2010. In the US, the Navy’s internal IT system faces a reported 110,000 cyber attacks every hour, according to HP, the company that manages the Navy Marine Corps Intranet. More recently, Red October, a cyber espionage campaign, was recently identified infiltrating both PCs and phones of international diplomats.
Political, military and business leaders know quite well that cyberwar is already among us. This is not to say that security has been an afterthought or wholly inadequate. In order to roll out today’s web-enabled infrastructures, our governments and industries have invested massive amounts of resources in security and this will only continue to grow. Currently, the US Department of Defense invests more than $3 billion annually in cybersecurity, its cyber-forces are 6,000 strong and could add another 1,000 over the next year. Last week, Neelie Kroes at the European Commission put a stake in the ground about cybercrime in an effort to curb data breaches, putting data & privacy requirements on companies that run large databases. The world is paying attention.
January 24, 2013
This blog post is also featured as a guest blog post on the WEF blog.
Until recently the term Internet of Things (IoT) has been a novel concept and ambitious vision that encompasses the endless technological possibilities that exist in a future where everything is truly connected. Today that world is finally becoming a reality.
We see evidence of this smart world all around us. From Jawbone to Nest to cars that are powered by the Android OS (perhaps a bit farther off), we’re engaging in new ways of interacting with technology through touch, voice and sensors. Qualcomm CEO Paul Jacobs put this into perspective at the CES conference recently where he commented that our unrivaled adoption of mobile worldwide and the associated shift of mobile technologies into many areas of our lives including TV, office, electric vehicles, health care and education has been instrumental in spurring the momentum of IoT.
The world is ready for this shift and the potential is huge. Currently, there are an estimated 8.7 billion Internet of thing- connected devices. That’s hardly a dent, according to Cisco, which estimates that more than 99% of physical objects that may one day join the network are still unconnected.
Industry and governments are making ready—last year the IoT-GSI Global Standards Initiative was created to promote a unified approach for development of technical standards enabling the IoT on a global scale. As we lay the foundation for this new world, we must prioritize the security risks associated with this shift. With its many benefits, IoT also poses great security and data privacy challenges that must be addressed and governed. As the physical and digital worlds merge, and we become more reliant on the interconnections forged, we need to collaborate to ensure the integrity of its security. The consequences of not doing so escalate as the physical world entwines with our digital one. At the Forum this week, we should prioritize conversations about what it will take to protect the critical infrastructure that is powering the ‘internet of things’.
January 24, 2013
The moment someone returns a lost phone : priceless. The message you leave the person who found your phone to get it back : legendary.
With Lookout’s customizable Lock screen feature, you give the person who found your phone a way to get it in contact with you, helping you get it back. Life is too important to take seriously though, so Rachel and I had some fun with Lock screen messages you could put on your phone should you lose it.
What would you put on your Lock screen?
January 23, 2013
Today we are excited to start the roll-out of two more ways that Lookout Mobile Security for Android can help you recover your stolen or lost device and better protect your mobile privacy. Download the latest version of Lookout from Google Play.
Protect Your Device From Prying Eyes
Lock Cam is a free feature that notifies you if anyone tries to access your device, whether it has been stolen, or if someone else may be trying to take a peek when you’re not around.
Lock Cam takes a picture of anyone who enters an incorrect password three times into your Android lock screen with the front-facing camera on your device. You’ll then receive an email with the picture and the location of your device, giving you valuable information about who tried to access your device and where it happened. You can then use this information to take steps to further protect your device, like changing or strengthening your password.
January 20, 2013
Last year, we announced we were teaming up with Deutsche Telekom, one of the largest mobile carriers in Europe, to provide Deutsche Telekom’s millions of customers with mobile security and privacy protection. We are happy to announce today that Lookout and Deutsche Telekom are continuing that very mission by shipping the first devices with Lookout pre-installed. The Samsung Galaxy S3 Mini and the HTC K2 LTE will be the first phones to receive Lookout’s built-in protection, with an additional five devices by the end of March.
In addition, both companies are laser-focused on mobile privacy for individuals and released the “Experts Guide to Mobile Privacy,” which offers solutions and preventative tips to improve privacy on smartphones and tablets. Mobile phones carry the most personal and valued information, from photos to email and social network accounts to text messages, our phones have become our lifelines, which is precisely why we must keep them safe.
With Lookout, Deutsche Telekom customers can have the confidence to use their smartphones to their fullest capabilities, and have peace of mind knowing they are protected no matter what they do. Customers will benefit from instant, easy-to-use protection against bad apps, unsafe links, data loss, privacy theft or even phone loss or theft.
This is yet another exciting milestone for Lookout. Deutsch Telekom has an exciting reputation for cutting-edge innovation and delivering value and quality to its customers. More than ever, security is top of mind for people worldwide. This partnership with Deutsch Telekom brings us one step closer to protecting every device around the globe.
January 20, 2013
John Hering took the stage today at DLD 2013 Conference in Munich. If you’re not familiar with DLD, the event is best described as the TED of Europe, where design meets science alongside technology, art and seemingly crazy ideas.
Joined by Rene Obermann (CEO of Deutsche Telekom), Klaus Hommels (well-known European angel investor) and Diane Brady (Senior Editor at Businessweek), Hering and the panel discussed how big companies work with small companies in their session, Patterns of Connectivity. Sure, size is all relative. But when you look at Deutsche Telekom’s workforce of 230,000 people compared to our 200 employees, we’re the smaller guy in this scenario.
Rene Obermann spoke about how Lookout and other apps help raise the level of coolness for the Telekom brand. Obermann also noted how he’s impressed by Lookout’s knack for quickly innovating and constantly thinking beyond the current reality and into the future of our connected world’s security needs. When asked by Diane Brady, “Why not just buy Lookout?” Obermann responded, “First off, that price tag is too big. Also, in this case of Big working with Small, we’d suffocate them with love. Lookout innovates from the inside-out and that’s the way it ought to be.”
Hering shared some background on how Lookout works with bigger players: “We know what we want to be when we grow up. And we never forget that when working with partners. We’re great at creating complimentary partnerships. We know our strengths and the advantages that great partnerships can bring for us and users worldwide.”
You can check out live video content from the event here.
January 16, 2013
Its not hard to imagine a future where every object we touch is connected. The future of mobile innovation is evolving worldwide, and it’s shaping the way we go about living our daily lives. This will be the topic of discussion during Lookout’s CEO John Hering’s panel discussion at DLD (Jan. 20-22), the internet-focused TED of Europe. John will be joined onstage by Deutsche Telecom CEO René Obermann and Klaus Hommels from Lakestar Investments to explore the emerging trends from around the mobile, global world. Our dear DLD friend Diane Brady, senior editor of Bloomberg Businessweek will be introducing the panel and moderating the discussion.
While overseas, Lookout will also travel to Switzerland for the World Economic Forum’s Annual Meeting 2013 (Jan. 23-27), returning as a 2013 Technology Pioneer. “Entrepreneurship in the global public interest.” That’s the motto of the World Economic Forum, and it’s one that we stand behind here at Lookout. We’ll join thought leaders from across the world in shaping the global, regional and industry agendas. There’s a global spotlight on security, and we look forward to working with global delegates to discuss the challenges we face and work towards a solution.
We’ll be blogging live from DLD on Jan. 21 – more news to come!
January 11, 2013
If your password is password, the two first names of your children or 222222, this blog post goes out to you.
Its hard to remember twenty different passwords for your bank, email, online shopping and every social network you belong. But the truth is, bad guys are crafty, free software cracking tools are widely available and today’s incredible computing power makes quick work of even moderately complex passwords. I’d be willing to bet my Lookout water bottle that your password could be stronger. To keep your phone secure, you’ll need to create (and remember!) secure passwords for both your lock-screen and the different accounts you use on the internet.
Here are a few tips we pulled together to help. Keep in mind, this alone won’t keep you secure — but its a step in the right direction.
Specific to mobile phones:
- Make sure your phone has a password-protected lock-screen. Password (alphanumeric) is the strongest on Android, but numeric PINs are better than nothing.
- Say yes to two-step authentication if its offered. Many mobile banking websites or apps will send a code to your mobile phone that is then entered when you access the account or app.
- Set your phone to automatically lock on sleep mode if it is idle for a few minutes.
- Encrypt the data on your phone so that its protected from snooping when powered off. iOS devices automatically encrypt and Android users can configure it in “Settings.”
- Turning off “Make passwords visible” is a good idea so that potential snoopers can’t easily read your password as you type it.
For Internet passwords (which are now often accessed on your phone):
- As much as possible, the passwords that you use on the Internet should be different from all the other ones you use. Reusing passwords across multiple accounts creates a single point of failure.
- Use different email addresses for different accounts. Have a separate “junk” email address for spam or free sites that require login.
- Don’t use dictionary terms unless you are stringing them together in some sort of unlikely phrase. JennaSurfsHamBoatsForChristmas > jenna123. (Neither of these are my passwords BTW). This XKCD comic offers a witty take on why this is the case.
- The longer and more uncertain/uncommon the combination of letters, numbers and symbols, the more computational power needed to crack the password. Therefore, the most secure passwords are random but don’t have to be unmemorable. Thieves already account for simple letter / number substitutions, like using 3 instead of E, or $ instead of S. So P@$$w0rd is really just as safe as the normal way.
For a more in-depth look at passwords and their pitfalls, we recommend reading Mat Honan’s Wired article.
January 3, 2013
Lookout Super User: Michael
Occupation: IT Specialist
Location: Aurora, CA
Lookout User Since: 2009
Favorite Lookout Feature: Plan B
Moral of the Story: “I cannot thank Lookout enough.”