October 30, 2015

Employee Spotlight: Stephanie Shupe, senior software engineer, on women in tech and writing clean code

In this series we’re highlighting some of our awesome employees and the work they do. In their own words, you’ll hear about our employees biggest wins, favorite moments, and reasons for doing what they do. Interested in starting a career at Lookout? Check out our open jobs.

Stephanie Shupe

Category:   Uncategorized
October 26, 2015

The ways we accidentally give over our information on mobile

Wifi-BlogImage

Smartphones are pretty great, aren’t they? They’re small, portable and give us access to a world of information literally in our pockets.

But mobile devices’ small form also means we interact with them pretty differently than desktop computers. In fact, studies have shown that users are 3x more likely to click on a malicious link from their smartphone than a PC!

Category:   Mobile Tips + Tricks
October 23, 2015

Employee spotlight: Chris Dehghanpoor, Senior Security Analyst, on Android malware, flamethrowing

In this series we’re highlighting some of our awesome employees and the work they do. In their own words, you’ll hear about our employees biggest wins, favorite moments, and reasons for doing what they do. Interested in starting a career at Lookout? Check out our open jobs.

Chris-D-2

Chris Dehghanpoor

Senior Security Analyst on the Research and Response Team
Category:   Lookout News
October 19, 2015

The problem with public Wi-Fi

PhishingBlogImg

We’ve all been there: you’re running low on data, but you’re stuck in a really long line and want to check Facebook. Maybe you’re at the airport and realized you didn’t download that eBook for the plane.

Unfortunately, connecting to and using that public Wi-Fi may be jeopardize your data and privacy.

Category:   Mobile Tips + Tricks
October 14, 2015

Breaking open South Korea’s government-approved children-targeted surveillanceware

In April of this year, South Korea began mandating that government-approved monitoring software be installed on smartphones used by anyone 19 years of age or younger. Unfortunately, one of the most widely-used, government-approved versions of this “monitoring software” actually left children’s data wide open to prying eyes.

Earlier this year, I participated in the Citizen Lab Summer Institute – a series of research workshops hosted in Toronto by Citizen Lab – and had the chance to collaborate with several researchers on this project that took a closer look at parental monitoring software used in South Korea.

Category:   Alerts  •  Security
October 13, 2015

Risky v. Malicious apps: How they’re different & why you need to care about both

There’s a hidden challenge enterprises face when securing mobile devices: some apps that are legitimate and useful in a personal context may introduce a major risk for an enterprise.

While it may not be immediately evident, there are in fact two different categories of harmful applications to an enterprise: malicious apps and risky apps.

As the person responsible for securing mobile devices in your enterprise, you must focus on those apps that intend to do harm, but not forget those that may not be intentionally harmful, but still introduce risk. What’s the difference?

October 12, 2015

The real story behind those software updates

Software-HeroImage

Updating your software is sometimes an inconvenience, but it’s also necessary to keeping up your mobile security hygiene.

Sometimes updates require connecting to a power source, backing up data, or temporarily losing access to an app or service while the update processes. Whatever the reason, oftentimes we see that little tally of available updates increase and increase.

The problem is, there are many critical security fixes that get pushed through these OS and app updates and when we ignore them, we leave ourselves vulnerable and open to attack.

Category:   Mobile Tips + Tricks
October 8, 2015

Kemoge: Lookout protects against malware that roots devices

Kemoge, or what we call ShiftyBug, is a piece of Android malware that roots a victim’s device and installs itself as a system application, making it very difficult to remove. Its end game is to install additional applications on the to the device.

There are eight different exploits packed into the malware that are tailored to root that specific kind of device, the majority of which impact Samsung devices.

Category:   Security  •  Uncategorized
October 5, 2015

The case for not jailbreaking/rooting your device

PhishingBlogImg

Jailbreaking your iOS device (or rooting in the case of Android) is tempting. After all, who wouldn’t want access to a whole new world of apps, easier international travel, and more control over their phone?

If you’ve felt the lure to read the latest jailbreaking/rooting tutorial and take the plunge, you’re not alone: An estimated 7.5 percent of all iPhones—amounting to more than 30 million devices worldwide—are jailbroken. Jailbreaking is especially popular in China, where an estimated 13 percent of all iPhones are jailbroken.

Category:   Mobile Tips + Tricks  •  Uncategorized
October 5, 2015

Surprising new research: three-quarters of IT leaders have experienced a mobile data breach

IDG CIO-CISO Research Infographic_10.5-2

When you hear about major corporate breaches in the news, they don’t always originate from the same threat vector. Sony was allegedly hacked through PCs, Target through point of sale systems, J.P. Morgan likely through unprotected server infrastructure, the IRS through its “Get Transcript” app.

According to a new report from IDG Research, mobile is an important vector for attack. Seventy-four percent of IT leaders from global enterprises report that their organizations have experienced a data breach as a result of a mobile security issue.