February 3, 2016
You love your phone. It’s the first thing you look at in the morning, one of the last things you look at before bed. You take it to the bathroom with you.
No, we’re not following you around; we’re just like you. We’re all addicted — 73 percent of us — to this little device. Mobile devices are like bionic extensions of our arms, connecting us to friends, helping us keep up with work, tracking our health, letting us bank from anywhere, taking important pictures, the list goes on. Each of those turn into precious data points that your phone accesses or stockpiles — indeed, the data on your phone is worth $14,000!
However, for as critical to our everyday lives as they are, mobile devices as we know them are really only around a decade old. We believe it’s important to understand the impact of the mobile device, the huge amount of data it holds, and how we keep both safe. So, we surveyed over 700 people just like you.
Check out the results below and get smart about your mobile data and security.
August 19, 2015
While the federal government might be under the impression that it doesn’t have a BYOD program, it is overlooking a key issue: Shadow BYOD.
Shadow BYOD is very similar to Shadow IT, in which employees use technologies — usually to enhance their productivity — that the IT department has not sanctioned or deployed. In Shadow BYOD’s case, it’s the issue of unmanaged personal devices connecting to the network and accessing government or corporate data.
March 24, 2015
Lookout today announced the findings of its Mobile Privacy IQ study, a survey of smartphone owners in the United States, that examines data-based trends about our privacy mindsets and how they inform our perceptions, behaviors, and feelings toward privacy when using mobile devices.
What we found is that despite being increasingly tuned in to the importance of protecting the data on their mobile devices, a clear disconnect exists between people’s understanding of what it means to be privacy conscious and the actions they take in the real world.
Key findings include:
- People (particularly Millennials) claim to be highly aware of privacy issues yet still take part in risky mobile behavior like downloading apps from unofficial app stores and not reading app permissions.
- Although people express concern over how mobile apps are handling their information, they are willing to make the trade-off for convenience over privacy.
- A large percentage of smartphone owners care least about protecting work data on their devices, placing personal data over all other forms.
Interested in learning more? Read the full findings of Lookout’s Mobile Privacy IQ study.
January 15, 2015
2014 was the year of malware sophistication — new threats, monetization strategies, and distribution methods all surfaced and became legitimate issues.
That’s just one of our findings from this year’s Mobile Threat Report — Lookout’s deep dive into the world of mobile threats in 2014, which we are releasing today.
We looked into our dataset of the world’s mobile code, gathered anonymously from our 60 million sensors (our users!) around the globe. We analyzed this data and found a number of interesting trends:
- The number of Android users who encountered malware in the U.S. grew significantly — 75% — in the last year.
- Data exfiltration is a worldwide issue. If your data is stolen, don’t expect it to stay within one country’s borders.
- One threat can really make a difference. For example, ransomware was almost single-handedly responsible for the spike in U.S. mobile malware encounter rates.
And we expect that adversarial attention on the U.S. — a country that has traditionally flown under the mobile malware radar — will only continue in 2015.
Learn more about the state of mobile malware by checking out Lookout’s Mobile Threat Report. If you’re more interested in an enterprise take on the data, we’ve got you covered as well.
Got thoughts on what next year might hold? Leave us a comment!
Sprechen sie deutsch? Klicken sie hier.
Parlez-vous français? Cliquez ici.
October 6, 2014
In the last month we’ve learned about two vulnerabilities that affect the Android Open Source Project browser. The issue, however, is a widespread one, that touches more than just AOSP’s browser, but also derivative browsers that are based on AOSP’s code, such as Samsung’s browser.
The issue is actually fairly widespread in our userbase.
May 7, 2014
You’re in a coffee shop. It’s 3 p.m. and you really need that espresso to get you through the rest of the afternoon. The barista calls your name and you set your phone down on the table — just for a quick second! — to grab the productivity-saving drink.
When you turn around your phone — and all the precious data on it — is gone.
This is a classic phone theft story and, unfortunately, 3.1 million Americans experienced one like in it the last year. Lookout decided it was time to get a clearer picture of what that awful phone theft moment looks like, so we conducted research in partnership with IDG to figure out exactly what a phone theft scenario looks like. The result: our first Phone Theft in America report*.
December 10, 2013
At Lookout, we hear a lot of stories from the people who use our technology. How you found your lost phone in the snow, saved pictures from your camping trip, or captured a picture of your kids with Lock Cam. The funny thing about all these stories is that they almost always involve a kind stranger who spent the afternoon digging holes in the snow, a helpful police officer who went the extra mile to get your phone back or a cute child learning to use your new tablet. Technology is only as powerful as the people who use it, so we hope you’ll join us in celebrating our Tech Heroes this year— the people we rely on to set up, fix, and use our technology better than you ever thought possible. We found that 1 in three people have a Tech Hero, and 75% of those people would seek out their advice when buying a new smartphone or tablet device.
To celebrate, we’re holding a contest to recognize the Tech Heroes who come to our rescue. From Tuesday, December 10 to Monday, January 6 we’ll be giving away prizes every week like smartwatches, tablets and smart TVs. To enter, simply visit our Facebook app at and nominate your Tech Hero. You and your Tech Hero will be automatically entered every week to win. In addition, we’re awarding a Grand Prize winner decided on votes by the Lookout community. Encourage your friends and family to vote on your Tech Hero; the eligible person with the most votes on January 6 will win $1,000 each for both themselves and the person who nominated them. Even if you don’t participate, we hope you’ll go to the contest and vote for the person you believe deserves to win! You can find the Official Rules here.
December 10, 2013
After hearing from our customers over and over that they often rely on friends and family to save the day on mobile technology, we ran a national survey with Harris Interactive to investigate this trend. It turns out that we rely on others quite a bit to make technology connections happen. Sixty-three percent of people struggle to keep up with the latest mobile tech and 1 in 3 depend on tech savvy friends and family—we like to call them Tech Heroes—for a bit of help.
Below are some of the interesting things we learned about these rare birds, unicorns and diamonds in the rough we’ve come to depend on.
Anyone can be a Tech Hero: your friend who gives you the best app recommendations, the IT admin who rescued your pictures from a lost phone, even your kid who helps you locate the power button. While common belief suggests that tech experts are typically among younger age groups, 37% of Americans say their Tech Heroes are between ages 31-45, while 33% say they are between 21-30. Truth is, Tech Heroes come in all ages and can be found nationwide.
Tech Heroes come to our aid in a number of ways. Whether it’s helping to set up a new phone, troubleshooting a new device or downloading the latest apps, we rely on Tech Heroes to show us the ropes.
This holiday season, 45 million new smartphones are expected to hit shelves and mobile devices will top holiday wishlists. With the many new devices hitting shelves it can be difficult for people to decide on the perfect smartphone or tablet to meet the needs of their mobile lives. We learned that Tech Heroes have a large amount of influence over mobile commerce.
Interested in celebrating the Tech Hero in your life this holiday season? Nominate your Tech Hero (you can also nominate yourself) here. For those who are setting up their new phones this holiday season and don’t have a Tech Hero offhand, we’ve developed a Tech Hero Handbook with everything you need to know to set up a new phone, fix a cracked screen, or conserve your battery life.
October 21, 2013
Our phones are our lifelines and have become an essential tool for everyday life. We are constantly plugged into our phones – during the morning commute, just before bed — even at the dinner table. Gone are the days when we used phones merely as a means of communication. Smartphones have become our most personal computers and in many cases know more about us than our best friends. Lookout and Sprint today released the results of a national survey revealing consumers’ mobile behaviors, habits and concerns over privacy.
The results reveal a striking attachment to our mobile devices and a concern over the exposure of personal information.
My smartphone and I are connected at the hip.
A day without your phone? Not any more. The majority of Americans admitted they can’t go one hour without checking the phone in their pocket. Texting surpasses calling and email as the feature most missed when without the phone (29%), followed by calling (26%) and emails (9%).
June 26, 2013
Privacy and good user experience on mobile are critical – after all, people need to trust and feel comfortable on their smartphones and tablets in order to use them! But questionable mobile advertising practices, such as adware, can get in the way of user privacy and experience, doing things like capturing personal information (i.e., email, location, address list, etc.) without proper notification and modifying phone settings and desktops without consent. While the majority of mobile ads are A-OK, as the industry grows, it needs to protect user privacy and excellent user experience. Beginning today, we’ll be flagging ad networks that we have newly classified as adware in Lookout Mobile Security. We’re also releasing our classification of adware to help guide the industry.