September 23, 2014

Why I hacked TouchID (again) and still think it’s awesome

Last year, when the iPhone 5S was released, I showed how you could hack its fancy new TouchID fingerprint sensor. A year and one iPhone 6 later, I’ve done it again.

Category:   Security
September 11, 2014

Lookout wins CTIA award!

We’re honored to announce that Lookout was awarded CTIA’s MobITs Award for the mobile security and privacy category.

mobITs logo

Announced at CTIA’s Super Mobility Week, the MobITs Awards “represent the most innovative IT solutions that help companies secure their operations and improve their customers’ experience by enhancing performance, efficiency, and productivity.”

In addition to taking home the MobITs Award, Lookout’s CEO Jim Dolce delivered a keynote on using innovation to help solve the enterprise mobile security problem, while our Principal Security Researcher Marc Rogers spoke to the benefits of integrating hackers into the workforce.

At Lookout, solving complex problems is at the core of what we do, but delivering a simple and effective solution to our users is what we strive for. CTIA is a leading organization in the wireless industry and with our many notable carrier partners such as Sprint, AT&T, T-Mobile, and several more internationally, we are thrilled to be recognized as a company that is leading the pack in securing the mobile environment for people everywhere.

 

 

Category:   Lookout News
September 10, 2014

Mobile 101: Expert tips for safely disposing of your old iPhone

Apple’s long-awaited iPhone announcement has consumers champing at the bit to get their hands on Apple’s latest device. For all those planning to bid farewell to their old iPhones and upgrade to the latest model on September 19, you’ll want to make sure that you give your old phone a proper scrub before disposing of it.

To ensure that all the personal data on your old phone doesn’t end up in the wrong hands, check out Lookout’s expert tips for safely disposing of an old phone:



 

Category:   Mobile Tips + Tricks
September 9, 2014

Shopped at Home Depot lately? Here’s how to protect yourself in the wake of the data breach

Home Depot

If you used your credit card at a Home Depot store in the U.S. or Canada between April and about a week or so ago you really should read this post.

Home Depot has confirmed that its payment system was breached, which means that 60 million or more credit card numbers likely were stolen, according to The New York Times. (Last year’s Target breach impacted 40 million cardholders, so this could be the largest known breach to date.)

Category:   Security
September 9, 2014

Want to learn about innovating enterprise mobile security? Listen to this talk

Jim Dolce CTIAWe’re really excited because today at CTIA’s Super Mobility Week, our CEO Jim Dolce will be giving a keynote on an issue near and dear to our hearts: Using innovation to help solve the enterprise mobile security problem.

Today, work and home life are merging, which means the days of the buttoned-up corporate network are over. The number of smartphones around the globe will continue to accelerate this year, growing to nearly 2.4 billion–up more than 25 percent year over year. And, of course, nearly 1 billion of those devices will find there way into the corporate environment by 2017.

The mobile device continues to change and reform the network perimeter.

Jim will touch on:

  • Why security investment needs to shift
  • Why the new big data approach is going to be the keystone of mobile security in the enterprise
  • Making it more expensive for the bad guys to evade detection

Watch the keynote live at 3:30pm PT here and leave your thoughts in the comments!

September 8, 2014

Back to School Smartphone Guide

By the time fall rolls around, there are reminders everywhere that it’s time to let go of the carefree spirit of summer to make room for the responsibility that comes with autumn. And rightly so – whether you or your child is starting a new school year or you simply want to lock down all of the memories you saved to your phone all summer long, there’s just more data to look after this time of the year. Unfortunately, a smartphone snafu could put your child’s personal information in jeopardy quicker than you can say “Pumpkin Spice Latte.” Fortunately for you, this terrible fate is easily avoidable with a little Mobile Security 101.

Category:   Hidden  •  Mobile Tips + Tricks
September 3, 2014

Uncovering how the recent celebrity image breach happened

This weekend close to 700 highly personal photos of more than 25 celebrities were leaked publicly.  We looked into the origins of this dump and the files inside it to shed some light into how they got there, particularly to understand how best to protect users against this sort of crime in the future.

Category:   Mobile Tips + Tricks  •  Security
September 2, 2014

3 ways to keep your Apple ID safe

By now you’ve probably heard about the celebrities whose “sexy” photos were leaked to the public after their Apple accounts were allegedly hacked.

But celebrities aren’t the only ones who store their photos in the cloud. We do, every day, along with a host of other types of data such as credit card numbers, medical records, personally identifiable emails, contacts, emails, and more. And celebrities certainly aren’t the only ones who put their trust in Apple’s services.

We’ve pulled together a list of tips for keeping your Apple accounts secure and other generally good practices when using the cloud!

Category:   Mobile Tips + Tricks