September 24, 2015

Threat protection and EMM: What the relationship means for CIOs

Good security relies on strong relationships. The security industry wants to work with hackers, to learn from them and understand their modes of thinking. Security professionals want to share information to ensure everyone understands the broad scope of threats and what they can do to corporate data. Similarly, security technologies want to connect together to deliver new depths of protection.

This is especially the case in the mobile industry. There is no silver bullet to mobile security. It takes specialization — experts working together — to ensure the bases are covered.

Threat protection and enterprise mobility management solutions play together perfectly in this way in that both help enterprises see and manage the risks associated with mobility so that employees are empowered to embrace it.

September 22, 2015

Good news: Lookout can protect you from XcodeGhost

If you’re an individual Lookout user running iOS 8 (or below) or an enterprise customer running any version of iOS, Lookout protects you from XcodeGhost by automatically detecting and alerting you to the offending app.

With roughly half of the iOS user base still running iOS 8, we’re happy to be able to offer this protection to a large percentage of our users.

Unfortunately, due to limitations in iOS 9, we cannot currently protect individuals on the new operating system through our consumer app, but we are working to find a solution that will keep our users safe. If you are running iOS 9, here is a list of affected apps and what you should do.

Due to Apple’s enterprise app distribution approach, we can protect enterprise users of Lookout Mobile Threat Protection, regardless of which version of the OS they are running.

To download Lookout for consumer use, visit the app store.

To learn more about our Enterprise products, visit our Mobile Threat Protection page.

 

Category:   Security
September 22, 2015

Life at Lookout: Introducing our company attributes

LIL_GraphicIt’s hard to believe that Lookout is nearly 8 years old. What started as a pipedream to solve emerging mobile security challenges has become a thriving business that employs more than 300 people in development centers across San Francisco, Boston and Toronto, along with sales office around the world.

During this time, we’ve transitioned from a small startup to a scalable, growth stage company. In the process, we’ve expanded beyond a purely consumer focus to include the complex security issues that large enterprise customers face today.

Over the past several months, we’ve also taken some time to create a set of core values that align with our mission and vision.  It’s easy to shrug off values as a pointless exercise—it’s all about revenue, right? Not at all. Any seasoned leader knows building a sustainable business is not only about product, but about great people and the value system that guides them on a daily basis.  “Life at Lookout” defines the values that will serve as our North Star through our next stage of growth.

So, I wanted to take a moment to recap the principal attributes we aspire to embody at Lookout.

Category:   Lookout News
September 21, 2015

Updated: XcodeGhost iOS malware: The list of affected apps and what you should do

IMG_4512

Researchers recently found a piece of iOS malware called XcodeGhost in a number of apps in the Apple App Store. The creator(s) of XcodeGhost were able to sneak the malicious code into these apps without the app developers’ knowledge. These unsuspecting apps include popular consumer apps like WeChat and CamCard, showcasing the potential for the XcodeGhost malware to impact potentially hundreds of millions of victims.

Category:   Security
September 20, 2015

Hundreds of millions of devices potentially affected by first major iOS malware outbreak

XcodeGhost is the latest example that iOS devices, indeed any device, can be subject to attack and that even a highly-curated app store can contain malicious apps.

Lookout Mobile Threat Protection customers are already protected from this malware and do not need to take any further action. For customers using our consumer mobile security solution more information is available here.

XcodeGhost is malicious code inserted into iOS apps using a tampered version of Apple’s Xcode that steals data from iOS devices. The malicious code stealthily made its way into over a number of applications in the Apple App Store without the developers of those apps knowing. Indeed, it’s the largest attack on the App Store we’ve seen to date.

Category:   Alerts  •  malware  •  Security
September 15, 2015

We love design: Lookout partners with Bridge to find top talent

IMG_99642

We’re excited to announce that Bridge, a professional development program hosted by Designer Fund, and Lookout are partnering to find talented designers to join our team. Bridge connects experienced designers with top companies and the design community in San Francisco.

Category:   Lookout News
September 14, 2015

Check out our co-founder’s security advice to the auto industry in TechCrunch

TH5

After hacking a Tesla over the past year, Kevin Mahaffey came to a simple conclusion: “When you connect a car to the Internet, it is no longer just a car: It is a computer on wheels.”

He recently published his thoughts in an Op/Ed with TechCrunch, which you can read here.

Category:   Security
September 10, 2015

Change to sideloading apps in iOS 9 is a security win

Among the many new features in iOS 9, Apple introduced a critical adjustment enterprises should note: a change in sideloading applications that we think is a serious win for security.

Category:   Security
September 2, 2015

KeyRaider: Simplified

The recently revealed KeyRaider is yet another proof point that malicious actors are looking to tinker with iOS.

It’s a piece of malware that affects jailbroken iOS devices and was distributed through a Chinese repository which could be used by Cydia users. Because of this, its exposure was relatively limited.

KeyRaider’s goal is to allow anyone with a jailbroken device running specific instances of KeyRaider to spoof in-app purchases without having to pay, and download paid apps from the Apple App Store, though we haven’t been able to definitively confirm this functionality.

Category:   Security