Lookout tracks breaches related to companies and services that may impact customers with our Breach Report feature. Breach Report looks at the largest companies globally, and reports on those breaches to provide customers the most relevant information. It also provides remediation actions to help keep them safe. Interested in getting Breach Report? Upgrade to Premium now.
Attackers successfully breached 15 companies from a wide range of industries including retail, transportation, government services, hospitality, technology, gaming, and more. Among them, the biggest names included popular music festival Coachella, restaurant chain Arby’s, and the InterContinental Hotel Group. In the process, attackers were able to compromise nearly 7 million accounts, according to public reports of these incidents.
Lookout tracks breaches related to companies and services that may impact customers with our Breach Report feature. Breach Report looks at the largest companies globally, and reports on those to give customers the most relevant information to them. It also provides remediation actions to help keep them safe. Interested in getting Breach Report? Upgrade to Premium now.
Though we are only one month into the new year, attackers have already breached over six million user accounts or personal records, according to data from Breach Report, a new feature in Lookout Personal for iOS and Android that tracks data breaches around the world.
If the twinkle lights on trees and the familiar tunes of carols emanating from coworkers’ earbuds haven’t given it away already: we’ve officially entered holiday shopping season.
This means you may be likely to use your mobile device to purchase presents for your family and friends. It’s more important than ever to be vigilant while making purchases on your mobile device in order to avoid mobile scams.
IBM quotes the rise in mobile shopping on Black Friday 2015 saying, “Mobile shopping habits shifted noticeably … marking the first time smartphones generated more sales than tablets, mainly by stealing device share from desktops.”
While people are seeing the benefits of mobile shopping — ease of price comparisons in-store, convenience to shop anywhere anytime — opportunistic criminals are seeing potential benefits, as well.
Today, Lookout is adding two new tools to our Personal app for individuals who are concerned about the safety of their digital identity and financial data.
In today’s mobile world our personal information is stored in many services on our devices and across the internet, which is a great thing for our daily digital lives. Criminals see value in this information, too, especially if it’s information associated with our identities, and may attempt to breach the services we use to obtain it.
Identity Theft Protection helps you detect and recover from identity theft, and Breach Report notifies you with clear, actionable information about corporate data breaches that may impact you. These new features, coupled with our time-tested security technology, make the Lookout Personal app the only all-in-one app for mobile security, identity theft protection, and device theft prevention.
While October is typically associated with spooky Halloween costumes and binging on sweets, October also means celebrating European Cyber Security Month. While it doesn’t involve any ghosts and ghouls, security threats are sometimes scary too, so the European Cyber Security Month (ECSM) initiative promotes awareness of cyber security issues and best practices for how everyone can stay safe online.
The last week of October is Mobile Malware Week, so to help raise awareness of mobile malware and give everyone the information they need to avoid it, we’ve partnered with Europol and the National Cyber Security Centre (NCSC) to give you the tips you need to protect yourself from mobile malware.
While mobile malware creators will always find creative ways to try and get their malicious software on your mobile device, there are a few simple ways you can adjust your behaviour to lower your risk of falling victim to mobile malware:
1. Only download from official app stores. If that free version of your favourite app shows up in a third party app store and sounds too good to be true, it probably is. While the app could have the same functionality it promotes, it could be stealing your information, charging you money, or slowing down your phone in the background as you play. It is also a good idea to check out an app’s reviews to make sure that it is credible before downloading.
2. Don’t fall for phishing scams. Phishing is where an attacker tricks you into giving over your personal information or other data the attacker might want. For example, a criminal may send you an email that looks like it came from your bank asking you to verify your password. Trust your instincts. If the request seems weird or oddly timed, head to the company’s official website and contact them directly to confirm if the request came from them. Phishing scams generally give themselves away with bad grammar and spelling, but others can look very realistic.
3. Think before you click. On the small screen of a mobile device, it can be hard to know if a link you’ve received in an email is safe, but clicking on a malicious link could lead you to a phishing scam or to download malware to your device without you knowing. If you receive a link from someone you don’t know, it is best not to click on it. You can always go right to a company’s website to access the webpage. If you notice a website with a spelling error, close it immediately — www.go0gle.com is not the same as www.google.com.
4. Think before you download. Just like you shouldn’t click on a link in an email that comes from someone you don’t know, you also shouldn’t download any attachments from that email, since they could be malicious.
5. Stay up to date. Malware can be used to exploit vulnerabilities in your mobile device’s software. Those software updates you receive from your carrier or manufacturer often include “patches” for these vulnerabilities. Whenever your carrier or manufacturer pushes a software update to your phone, make sure you update as soon as possible.
6. Install a mobile security app. No matter how careful you are clicking on links and downloading apps, sometimes you can accidentally download something you didn’t want. That’s why it’s nice to have a mobile security app, such as Lookout, ensuring all the websites you visit and the apps you download are safe. There’s nothing like peace of mind when it comes to protecting your mobile device and everything on it.
For more detailed tips on staying safe while mobile banking, and protecting yourself from web-based threats and mobile ransomware, check out Europol’s bank of useful assets.
In the spirit of raising awareness during ECSM and helping keep people safe, share this post on Facebook with your family and friends. Not only will you be offering great advice, you could win one year of Lookout Premium! We’ll be picking five winners on October 31st.
In this 4-part series you’ll learn why mobile security matters. We’ll explain common threats, debunk myths, and give you the tools to protect your phone and data — all while speaking a language you still understand. This is the final installment. Make sure to catch up on previous chapters in the series: mobile ransomware, spyware, adware.
In this 4-part series you’ll learn why mobile security matters. We’ll explain common threats, debunk myths, and give you the tools to protect your phone and data — all while speaking a language you still understand. This is part three. Stay tuned for next week’s chapter on root enablers.
In this 4-part series you’ll learn why mobile security matters. We’ll explain common threats, debunk myths, and give you the tools to protect your phone and data — all while speaking a language you still understand. This is part two. Stay tuned for next week’s chapter on adware.
In this 4-part series you’ll learn why mobile security matters. We’ll explain common threats, debunk myths, and give you the tools to protect your phone and data — all while speaking a language you still understand. This is part one. Stay tuned for next week’s chapter on Surveillanceware.