April 21, 2016

How we were able to spy on a 60 Minutes reporter

Screen Shot 2016-04-20 at 11.28.38 AM

Without apps, our mobile devices would be, well, phones. Apps are what take our devices to the next level, making them ultimately an assistant to our everyday activities.

However, malicious applications represent one of the main ways mobile devices are able to be compromised.

We demonstrated an example of what can happen if a malicious app infects a mobile device on 60 Minutes.

Read More

April 17, 2016

Can a phone be hacked? Watch Lookout on 60 Minutes

Screen Shot 2016-04-17 at 5.34.59 PM

Interested in getting more in-depth information on our attacks? Read about how we did the Wi-Fi attack here and the mobile malware attack here

Tonight, 60 Minutes featured Lookout co-founder John Hering and a number of other well-known and respected security researchers demonstrating mobile attacks.

Read More

April 15, 2016

Security week-in-review: Bricking, Blackholes, and bugs

6982098493_ec7ca07b53_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a bug that could brick an iPhone, what the White House is doing to get smarter about security, vulnerabilities, and more. Check back every Friday to learn about the latest in security news.

Read More

April 8, 2016

Security week-in-review: Think twice if your CEO asks you for money

8136629475_f6f0b408b3_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a warning from the FBI, a quick fix from Apple for an iPhone vulnerability, and more. Check back every Friday to learn about the latest in security news.

Read More

April 7, 2016

Straight to costs: What a mobile data breach will do to your bottom line

For the past four weeks Lookout has dived into a number of key findings straight from the mouths of security and IT professionals you work with every day. This is week four. Check out all of the blogs in the series:

  1. Week 1: Mobile devices — frequently a part of broader cyber attacks
  2. Week 2: It’s 9am, do you know where your data is?
  3. Week 3: How global enterprises are protecting themselves against mobile attack
  4. Week 4: Straight to costs: What a mobile data breach will do to your bottom line

With the average cost to triage a mobile malware infection at $9,485, IT and security departments could spend a total of $26.4 million annually.

At any given point in time, 3% of mobile devices are infected by malware, according to a 2016 study from The Ponemon Institute. An average enterprise could spend up to 13% of its total IT budget on triaging mobile malware infections alone.

Read More

April 1, 2016

Security Week-in-Review: Attacked by a state sponsor in Gmail? Google will tell you

Screen Shot 2016-04-01 at 3.52.40 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we talk about a yet another hospital’s computer systems held by ransomware, special Gmail warnings, and a vulnerability in Instagram. Check back every Friday to learn about the latest in security news.

Read More

March 25, 2016

Security Week-in-Review: Holding a hospital crypto-ransom

 

Open door of a working operating room

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we talk about a Verizon breach, illicitly selling passwords, a hospital’s systems held under crypto-ransom, and more. Check back every Friday to learn about the latest in security news.

Read More

March 24, 2016

How global enterprises are protecting themselves against mobile attack

For the next four weeks Lookout is diving into a number of key findings straight from the mouths of security and IT professionals you work with every day. This is week three. Check back for more insights from the field.

An employee’s access to confidential data on mobile devices has increased substantially over the past two years, say 74% of IT and security pros in a new report from the Ponemon Institute. In order to keep up, enterprises worldwide have had to adopt a number of tactics to ensure confidential data stays safe.

The relationship between mobile devices and data is widening. Employees are finding new tools to make their jobs easier, from SaaS products to being able to access email and documents on their commute home. Mobile devices offer a new way to work.

However, today only 36% of security and IT professionals at global companies say they are vigilantly protecting the sensitive corporate data employees access on their mobile devices.

These are the forward-thinkers in the industry who understand that mobile security is important not just to protect against threats, but because they know mobility is good for their workers.

Here’s are the most common mobile security features they have deployed:

Screen Shot 2016-03-24 at 11.39.48 AM

Read More

March 17, 2016

It’s 9am, do you know where your data is?

For the next four weeks Lookout is diving into a number of key findings straight from the mouths of security and IT professionals you work with every day. This is week two. Check back for more insights from the field.

There’s a disconnect between IT security departments and the employees they protect: IT often doesn’t know what kinds of data employees can access via their mobile devices.

Fifty-six percent of IT and security professionals believe people are only accessing texts and emails, according to a report from The Ponemon Institute. This perception paints the picture of employees who sit at their desks all day and every now and again check their phone for a message. Mobile devices, however, are being used for so much more, and the use cases are clear in the data:

Screen Shot 2016-03-17 at 4.42.04 PM

Read More

March 14, 2016

CeBIT 2016: What hacking cars has to do with your business

image2

This year at CeBIT, Lookout will be on the center stage, with Lookout’s CTO and co-founder, Kevin Mahaffey, sharing his talk, “Why I hacked Tesla and what it means for your business.” According to Mahaffey, what started as a car hack, turned into an investigation revealing many of the same challenges we see with traditional enterprise security. For example, how do you build a resilient and flexible perimeter in today’s mobile world? How do you get security updates systems working swiftly from day one?

Keynote: Thursday March 17th at 3:15 – 3:45 Hall 8, Center Stage

CeBIT is one of the largest IT trade events in the world, and is happening in Hannover Germany this week. At the event, we’ll be sharing news of our expansion into Germany, including many local partners and distributors. Check out the Lookout display at our partner, Mobile Iron’s booth (Hall 4, Stand A24). Please come visit it to say hello, or hallo.

If you can’t join the event in-person, you can also watch Kevin’s keynote from this live stream: http://webcast.nc3-cdn.com/clients/dmag/cgc2016/stage1/