November 19, 2014

The new NotCompatible: Sophisticated and evasive threat harbors the potential to compromise enterprise networks

Over the past two years, Lookout has tracked the evolution of NotCompatible. It was a compelling threat from the start, marking one of the first times hacked websites were used at a large scale to specifically target and infect mobile devices.

NotCompatible.C has set a new bar for mobile malware sophistication and operational complexity. The command infrastructure and communication perseveres and self-protects through redundancy and encryption, making it elusive and enduring. It’s an earthworm with its tail cut off that regenerates and thrives.

Category:   malware  •  Security
November 14, 2014

Lookout gains more enterprise mojo with Aaron Cockerill and David Helfer

Aaron Cockerill, VP of Enterprise

Aaron Cockerill, VP of Enterprise

Join us in welcoming Aaron Cockerill, VP of Enterprise Product, and David Helfer, VP of Worldwide Channel Development, into the Lookout family. As we continue our expansion into the large enterprise market, both Aaron and David will play an instrumental role in driving Lookout’s enterprise business forward.

With decades of product management and channel development experience from companies like Citrix and Juniper, Aaron and David are well equipped to lead Lookout’s charge in delivering solutions that large enterprises need in order to protect their businesses from mobile threats.

Hear from Aaron and David on why they joined Lookout and the problems they’re here to solve:

Category:   Lookout News
November 6, 2014

WireLurker: Another sign mobile is the emerging dominant platform

WireLurker, the iOS malware hitting headlines this morning, is just another proof point that malware authors are turning their heads toward the tiny computers living in your pockets.

Category:   Mobile Tips + Tricks  •  Security
November 5, 2014

Relentless mobile threats to avoid

Every day, Lookout analyzes more than 30,000 apps from around the world. While most are safe, a handful of them pose notable risks. Lookout assembled its first list of Relentless Mobile Threats to Avoid to shine a spotlight on the threats poised to affect millions of U.S. consumers, either because of their ubiquity, the extent of the damage they inflict, or both. They represent the threats that our researchers see as being among the most likely to land on your mobile phone. These threats can steal personal data, spy on consumers, and potentially cause people to lose control of their device.

Category:   Mobile Tips + Tricks  •  Security
November 4, 2014

Travel in the digital age

There’s just over a month left in the year, but it’s jam-packed with everyone’s favorite holidays. You’ve worked hard all year long, and now is the time for a little R&R. You’ll get to share a Thanksgiving feast with family and friends, score some sweet deals on Black Friday, and maybe even take that trip you’ve always wanted to go on to bring in the new year.  Before you throw your phone into your bag and hop onto that plane, you should secure your phone and protect everything on it. You don’t want to end the year with any unpleasant surprises, so set aside some time to square away a few important things before you make your trips this season.

Category:   Hidden  •  Mobile Tips + Tricks