March 15, 2017
2016 was the year mobile risk reduction became a necessity for global enterprises. Controlling mobile access to corporate data is now a top priority and proactive CISOs are selecting Lookout to accelerate secure mobility in the workplace.
This increase in customer orders drove Lookout to triple our billings year over year in 2016 compared to 2015 for Mobile Endpoint Security. To date, more than 150 enterprises, including top financial services institutions, technology leaders, healthcare providers, professional services firms, and large government agencies, are using Lookout Mobile Endpoint Security. Lookout also more than tripled the number of channel partnerships year over year, and we’re now working with over 80 distributors globally, including new partnerships with Carahsoft, Docomo, Ingram Micro, CDW, SHI, Synergie, and Netrix.
March 7, 2017
The graphic above appears in Gartner’s report, Market Guide for Mobile Threat Defense (MTD) Solutions*. I believe a comprehensive mobile security solution must cover all four of these quadrants and enterprises should look for single solutions that cover all aspects addressed by MTD + MARS.
In my conversations with CISOs, I repeatedly hear that one of the biggest issues they have is too many security products. They usually express different versions of, “I’ve got 50 different vendors and 50 different security products, and I simply can’t afford the personnel that I need to manage 50 different products.” I’m happy to share that at Lookout, our Mobile Endpoint Security solution is already a united single offering with capabilities that are usually considered separate parts of Mobile Threat Defense (MTD) and Mobile App Reputation Solutions (MARS) products.
February 16, 2017
ViperRAT is an active, advanced persistent threat (APT) that sophisticated threat actors are actively using to target and spy on the Israeli Defense Force.
The threat actors behind the ViperRAT surveillanceware collect a significant amount of sensitive information off of the device, and seem most interested in exfiltrating images and audio content. The attackers are also hijacking the device camera to take pictures.
Using data collected from the Lookout global sensor network, the Lookout research team was able to gain unique visibility into the ViperRAT malware, including 11 new, unreported applications. We also discovered and analyzed live, misconfigured malicious command and control servers (C2), from which we were able to identify how the attacker gets new, infected apps to secretly install and the types of activities they are monitoring. In addition, we uncovered the IMEIs of the targeted individuals (IMEIs will not be shared publicly for the privacy and safety of the victims) as well as the types of exfiltrated content.
In aggregate, the type of information stolen could let an attacker know where a person is, with whom they are associated (including contacts’ profile photos), the messages they are sending, the websites they visit and search history, screenshots that reveal data from other apps on the device, the conversations they have in the presence of the device, and a myriad of images including anything at which device’s camera is pointed.
February 16, 2017
Cyber war is a term the U.S. government is intimately familiar with, but woefully unprepared for when it comes to mobile.
Government employee mobile devices are a relatively new attack surface, and a particularly valuable one for espionage missions and other criminal intent. Mobile devices access confidential, classified, and other protected data classes. At this point, that’s just a fact. Both CSIS and the Presidential Cyber Commision acknowledge that mobile is no longer a fringe technology, but a central instrument that allows employees to get their jobs done.
Protecting data on mobile is non-negotiable and the responsibility of federal technology and security leaders across the entire government.
There are five principles any federal agency or organization must use to build a mobile security strategy. To forego such a strategy directly puts sensitive government data at risk.
January 23, 2017
Smartphones today have more computing power than a Cray III supercomputer. However, many security professionals put about as much thought into securing their mobile ecosystems as they did into securing Motorola RAZRv3 flip phones back in the day.
Vanity Fair interviewed my team to understand the story behind the discovery of Trident, the three zero-day vulnerabilities used to remotely jailbreak iOS devices, and Pegasus, the spyware that used these vulnerabilities to exploit targeted individuals.
January 19, 2017
Today, I am proud to announce that Lookout is now “FedRAMP Ready,” an indicator to federal agencies that Lookout Mobile Endpoint Security is vetted, secure, and can be quickly implemented into any U.S. government organization.
Lookout is the first mobile security solution to achieve this status.
December 5, 2016
The Presidential Commission on Enhancing National Cybersecurity released its report on securing and growing the digital economy in which one message is clear: de-prioritizing mobile security is no longer an option.
New priorities for a new mobile workplace
“The days of employees working only at an office using an organization-issued desktop computer fully managed by the organization are largely over. Market forces and employee demands have made “bring your own device” the de facto option in many workplaces. … Organizations no longer have the control over people, locations, networks, and devices on which they once relied to secure their data. Mobile technologies are heavily used by almost every organization’s employees, yet security for mobile devices is often not considered as high a priority as security for other computing platforms. In short, the classic concept of the security perimeter is largely obsolete.” – Excerpt from the Commission on Enhancing National Cybersecurity report
Employees in the public sector are using mobile devices every day to get their jobs done, whether government agencies know about it or not. Today, having a secured mobile workforce — which includes protection against risky applications, network attacks, and malicious intrusions — is a necessary element of an agency’s overall security architecture.
December 1, 2016
Gartner just published its “Predicts 2017: Endpoint and Mobile Security” report that includes findings and recommendations. I believe three of these to be significant for mobile security and for InfoSec and technology leaders heading into the new year. My take on these findings is below.
November 1, 2016
Two especially critical flaws that allow an attacker to root or completely compromise a device have just been added to the litany of vulns on Android devices.
The vulnerabilities are known colloquially as DirtyCow (CVE-2016-5195) and Drammer (CVE-2016-6728). While they are unrelated, they both represent a real risk to Android users as individuals have already published proof-of-concept exploit code online for both vulnerabilities, thus minimizing the time attackers would need to understand and develop their own exploits from scratch. Additionally, industry researchers have already seen attackers using DirtyCow to exploit Linux-based systems in the wild.
October 24, 2016
While October is typically associated with spooky Halloween costumes and binging on sweets, October also means celebrating European Cyber Security Month. While it doesn’t involve any ghosts and ghouls, security threats are sometimes scary too, so the European Cyber Security Month (ECSM) initiative promotes awareness of cyber security issues and best practices for how everyone can stay safe online.
The last week of October is Mobile Malware Week, so to help raise awareness of mobile malware and give everyone the information they need to avoid it, we’ve partnered with Europol and the National Cyber Security Centre (NCSC) to give you the tips you need to protect yourself from mobile malware.
While mobile malware creators will always find creative ways to try and get their malicious software on your mobile device, there are a few simple ways you can adjust your behaviour to lower your risk of falling victim to mobile malware:
1. Only download from official app stores. If that free version of your favourite app shows up in a third party app store and sounds too good to be true, it probably is. While the app could have the same functionality it promotes, it could be stealing your information, charging you money, or slowing down your phone in the background as you play. It is also a good idea to check out an app’s reviews to make sure that it is credible before downloading.
2. Don’t fall for phishing scams. Phishing is where an attacker tricks you into giving over your personal information or other data the attacker might want. For example, a criminal may send you an email that looks like it came from your bank asking you to verify your password. Trust your instincts. If the request seems weird or oddly timed, head to the company’s official website and contact them directly to confirm if the request came from them. Phishing scams generally give themselves away with bad grammar and spelling, but others can look very realistic.
3. Think before you click. On the small screen of a mobile device, it can be hard to know if a link you’ve received in an email is safe, but clicking on a malicious link could lead you to a phishing scam or to download malware to your device without you knowing. If you receive a link from someone you don’t know, it is best not to click on it. You can always go right to a company’s website to access the webpage. If you notice a website with a spelling error, close it immediately — www.go0gle.com is not the same as www.google.com.
4. Think before you download. Just like you shouldn’t click on a link in an email that comes from someone you don’t know, you also shouldn’t download any attachments from that email, since they could be malicious.
5. Stay up to date. Malware can be used to exploit vulnerabilities in your mobile device’s software. Those software updates you receive from your carrier or manufacturer often include “patches” for these vulnerabilities. Whenever your carrier or manufacturer pushes a software update to your phone, make sure you update as soon as possible.
6. Install a mobile security app. No matter how careful you are clicking on links and downloading apps, sometimes you can accidentally download something you didn’t want. That’s why it’s nice to have a mobile security app, such as Lookout, ensuring all the websites you visit and the apps you download are safe. There’s nothing like peace of mind when it comes to protecting your mobile device and everything on it.
For more detailed tips on staying safe while mobile banking, and protecting yourself from web-based threats and mobile ransomware, check out Europol’s bank of useful assets.
In the spirit of raising awareness during ECSM and helping keep people safe, share this post on Facebook with your family and friends. Not only will you be offering great advice, you could win one year of Lookout Premium! We’ll be picking five winners on October 31st.