September 27, 2013

Ending Lookout Updates for iOS 5 Users

As of version 2.13.2, Lookout will no longer be offering new versions of the Lookout app for users of iOS 5. This update will be available next week.

As we continue to improve the Lookout for iOS app, we will be using features and capabilities that are unique to the newest software versions of iOS, not all of which are supported in iOS 5. With the exciting release of iOS 7 last Wednesday, and the introduction of the iPhone 5S and 5C, almost 60% of iOS devices are already running the latest operating system. And as of today, less than 4% of users are running iOS 5 and older.

So what does this mean?

  • Devices with iOS 5 and below will effectively be frozen on version 2.13.2 of the Lookout app. They will not be able to download subsequent product updates.
  • Users with devices running iOS 5 will not be able to receive new features that may be launched in later versions of the Lookout app.

If you are using iOS 5 and would like to receive further Lookout updates, you can check to see if you are able to upgrade your device to iOS 6 or 7. To do this:

  1. Go into the Settings app on your device
  2. Tap on ‘General’ and then ‘Software Update’
  3. Here, you will be able to see if your device is eligible to upgrade to a new iOS

Remember, all iOS 5 devices will still have access to the current features that Lookout offers, and will still receive any security alerts that Lookout sends.

If you have any questions about Lookout’s compatibility on iOS, please visit

Category:   iPhone
September 24, 2013

Lookout Launches its First Transparency Report

At Lookout, one of our core tenets is “We’ve got your back.” This principle inspires every aspect of our culture, including how we think about privacy. Your privacy is incredibly important to us, and we’re committed to transparent, simple, and clear privacy practices. That’s why we released a shorter, more user-friendly privacy notice in July.

Today, we’re launching our first transparency report. You entrust us with your information, so we have a responsibility to be clear and open with you about government requests. More importantly, we think it’s the right thing to do.

This transparency report covers the requests that we’ve received from any government about our users between January 2010 and June 2013. As you can see, the large majority of our requests are from U.S. government agencies. They are often related to criminal cases such as smartphone theft and typically involve requests for basic subscriber information, such as a mobile phone number or an email address, to conduct their investigations. We have not received any requests related to U.S. national security-related matters, so this transparency report truly covers all government requests without exclusions.

Category:   Lookout News  •  Privacy
September 23, 2013

Why I Hacked Apple’s TouchID, And Still Think It Is Awesome.

By now, the news is out —TouchID was hacked. In truth, none of us really expected otherwise. Fingerprint biometrics use a security credential that gets left behind everywhere you go on everything you touch.

The fact that fingerprints can be lifted is not really up for debate— CSI technicians have been doing it for decades. The big question with TouchID was whether or not Apple could implement a design that would resist attacks using lifted fingerprints, or whether they would join the long line of manufacturers who had tried but failed to implement a completely secure solution.

Does this mean TouchID is flawed and that it should be avoided? The answer to that isn’t as simple as you might think. Yes, TouchID has flaws, and yes, it’s possible to exploit those flaws and unlock an iPhone. But, the reality is these flaws are not something that the average consumer should worry about. Why? Because exploiting them was anything but trivial.

Category:   Apple  •  Security
September 19, 2013

iOS 7 Lockscreen Bypass

Today it was reported that the latest version of Apple’s mobile operating system, iOS 7, has a flaw that allows an unauthorized person to bypass the lockscreen and access sensitive data and services. We investigated the flaw and discovered that, beyond what’s been previously reported, it extends beyond the timer app to include the calculator app. Additionally, we discovered that it’s possible to completely expose the contacts list.

The good news is, it’s easy to stay safe while waiting until Apple issues a fix:

  • Go to the settings app
  • Select the settings for “control center” and disable “control center”, “notification center” and “Siri” on the lockscreen

Category:   Apple
September 19, 2013

Thanks to Everyone Who Came to Scaling for Mobile Conference

Thanks to everyone who came last month to our conference, Scaling for Mobile. More than 50 Bay Area developers attended as we shared the successes and lessons we learned while scaling our workforce and mobile security products.

If you weren’t able to make it, check out Lookout’s SlideShare channel for the presentations, including the one below, “Scaling Up Lookout” by R. Tyler Croy.

Want to stay in touch and get notified about future Lookout tech events? Follow @LookoutEng on Twitter.

Category:   Lookout News
September 11, 2013

Lookout’s Take on Fingerprint Passcodes

Apple’s iPhone 5S announcement has everyone asking: will a simple touch of your fingerprint end the days of manually entering a passcode on your device? Probably not. But fingerprint technology is full of exciting promise for mobile security: if implemented correctly, it has the potential to usher in a new generation of secure mobile services.

Long rumored, the new 5S will have a “Touch ID” fingerprint technology built into the home button that will give users the ability to unlock the device with their fingerprint. Fingerprint technology is a great way for passcode-wary consumers to get a dose of security: just over half of people say they use a passcode on their phone today; and of those that don’t use a passcode, many say it’s because it’s inconvenient. With phone theft and loss huge threats to the privacy of your device, setting a passcode is critical. Fingerprint technology helps marry security and convenience, giving people a natural way to build device security into their life.

All technologies have weaknesses, and fingerprint-based biometrics is no different. One serious risk is that fingerprints can be lifted and duplicated. While we can expect the fingerprint scanner in Apple’s latest device to use the most advanced defenses to protect against these types of attack, it’s good to keep in mind that this technology has been circumvented before and is likely to be challenged again.

Category:   Featured  •  Security
September 10, 2013

Lookout Premium Now Included as Part of T-Mobile JUMP!

T-Mobile recently launched their new device upgrade program, JUMP!(tm), and we’re excited to share that Lookout Premium is available as part of the package!

If you are a T-Mobile customer, JUMP! is like your phone’s guardian angel. Gone are the days of waiting two years for the next affordable phone upgrade or freaking out if you drop your phone in water. JUMP! lets you upgrade to a new device up to twice a year, after just six months and also protects against malfunction, damage, loss and theft. Now included as part of JUMP! is Lookout Premium’s comprehensive security that helps to protect devices against malicious apps, web-based threats, privacy breaches and data loss.

We’ve worked closely with T-Mobile on mobile security since 2010, and this latest partnership reaffirms their commitment to delivering total device protection – inside and out!

Trade-in of an eligible device req’d. Deductible may apply. For more information on the JUMP! Program including pricing, visit T-Mobile’s website. JUMP! Is a registered trademark of T-Mobile USA, Inc. T-Mobile and the magenta color are registered trademarks of Deutsche Telekom AG. All rights reserved.

Category:   Lookout Premium
September 10, 2013

JollyBot: Malware as a Service Evolves


Lookout has identified JollyBot, a piece of Russian malware designed to hide inside innocent carrier applications in order to commit premium rate SMS fraud. Unlike traditional SMS fraud trojans where the malware author builds code, selects an innocent app and infects it himself, Jollybot is distributed by its authors as a service, similar to our recent findings on Dragon Lady. Once subscribed to this service, these affiliate customers are provided a toolkit or “SDK” in order for them to do all the heavy lifting. These affiliates choose which apps to infect, insert the SDK and distribute them – all the high risk parts of this criminal enterprise. Jollybot’s authors can sit back and collect a revenue share from these affiliates as payment for their service.


Category:   Alerts
September 3, 2013

Lookout Says Hello to Business, Partners with Samsung KNOX

Our mission has always been to protect every mobile device, and today 45 million people worldwide use our product and mobile operators globally partner with us to secure their customers’ devices.  This growth strengthens our security platform and sets the stage for us to expand and build security offerings for businesses and enterprises. Already more than 50% of the Fortune 1000 companies have employees using Lookout to protect their phones. Today, Lookout is excited to announce that it is expanding into business and will deliver our offering for business mobile security in the coming months.

As part of our move into the business space, I’m pleased to announce an exciting partnership with Samsung that will bring Lookout’s security to mobile devices with Samsung KNOX, Samsung’s secure device offering for business. Samsung KNOX is setting a standard for enterprise security on Android, and we’re thrilled Samsung selected Lookout to take KNOX business security to the next level. Wherever KNOX will be, Lookout will be there, too.

LookoutforBusinessProtection against mobile threats is essential in any workplace, especially a BYOD workplace. The way that employees work on and use their devices has changed dramatically over the past few years. The mechanisms by which businesses were protected in the past don’t work in a world where employees use a personal device in business and/or a business device in a personal context. Lookout’s expansion into business comes at a critical time and the security stakes are now higher.

According to Gartner, one in three companies now allow employees to bring their own devices to work, and whether or not it’s allowed, employees are doing so and company data is being accessed outside of the corporate network, potentially putting that data at risk. Thousands of businesses have approached us asking how they can get Lookout Mobile Security for their business needs. Our business users want the same level of mobile threat protection our consumer products offer. Lookout for Business will keep devices, networks and infrastructure safe from mobile threats and protect corporate devices, plus the sensitive data they carry.

We’re committed to delivering the best mobile security for consumers, and our expansion into business security and strategic partnership with Samsung fortifies our mission to protect every mobile device in the world. We’ll keep you posted when Lookout for Business is widely available later this year.

Category:   Lookout News  •  Samsung