June 2, 2016

Protect your privacy and avoid spyware with these tips

Infographic_Week2_FINAL_600

In this 4-part series you’ll learn why mobile security matters. We’ll explain common threats, debunk myths, and give you the tools to protect your phone and data — all while speaking a language you still understand. This is part two. Stay tuned for next week’s chapter on adware.

Read More

May 27, 2016

Security week-in-Review: Ransomware complaints doubled last year

5714394879_b220a44026_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore FBI warnings, spoofed enterprise apps, and bad passwords. Check back every Friday to learn about the latest in security news.

Read More

May 26, 2016

How to avoid paying ransom for your own device and data

Infographic_Week2_FINAL_600px

In this 4-part series you’ll learn why mobile security matters. We’ll explain common threats, debunk myths, and give you the tools to protect your phone and data — all while speaking a language you still understand. This is part one. Stay tuned for next week’s chapter on Surveillanceware.

Read More

May 25, 2016

5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere.

Lookout recently researched five families of malware doing just that: spoofing real enterprise apps to lure people to download their malware. Our dataset of mobile code shows that these five, active mobile malware families often impersonate enterprise apps by ripping off the legitimate app’s name and package name. These apps include Cisco’s Business Class Email app, ADP, Dropbox, FedEx Mobile, Zendesk, VMWare’s Horizon Client, Blackboard’s Mobile Learn app, and others.

All Lookout customers are protected from these threats.

Each family uses this tactic as a means to different ends. You can check out a list of the families and their various malicious aims below.

Read More

May 20, 2016

Security Week-in-Review: Popular apps have holes, too

8009146113_4d3c42df55_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore Android banking trojans, brute force attacks, and clickjacking schemes. Check back every Friday to learn about the latest in security news.

Read More

May 19, 2016

Think like a thief: safeguard your most personal device from loss or theft

Week1_Infographic_FINAL_600px

Read More

May 16, 2016

The house always wins: Takedown of a banking trojan in Google Play

Screen Shot 2016-04-25 at 8.03.58 AM

You always take your chances when you gamble, but with this Android malware, the odds are very much against you.

Lookout recently identified an app called “Black Jack Free” in the Google Play store, which turned out to be a variant of the malware family Acecard. The app has since been removed from the store. Because we previously issued coverage for this malware family months ago, all Lookout customers — individuals and enterprises — are safe. Non-Lookout customers who downloaded Black Jack Free (com.bjack.free) should immediately remove the app from their device and change the passwords to their sensitive accounts. This malware also attempts to download and install a secondary app called Play Store Update (cosmetiq.fl). This app should also be removed.

Read More

May 13, 2016

Security Week-in-Review: Old software, new problems

Screen Shot 2016-05-13 at 4.13.48 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore money-stealing malware, an SAP vulnerability from 2010, and patches. Check back every Friday to learn about the latest in security news.

Read More

May 6, 2016

Security Week-in-Review: Bug hunter wins $10K at the tender age of 10

9515347364_0e2e159f48_z

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a young bug bounty hunter, the ADP breach, and the dangers of unpatched systems. Check back every Friday to learn about the latest in security news.

Read More

April 29, 2016

Security week-in-review: Mobile phone thief thwarted by “Theftie”

Screen Shot 2016-04-29 at 2.24.06 PM

It’s hard to keep up with the hundreds of security-specific headlines published every week.

So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore a thefties, Firefox vulns, and a warning: don’t upload your Slack credentials to Github! Check back every Friday to learn about the latest in security news.

Read More