- Log In
The iOS App Store is not the impenetrable walled garden you think it is.
For years consumers have lifted up iOS as the safe mobile operating system. Comparatively, it does see much less malware than Android likely due to its rigorous manual testing of App Store apps and technological limitations that only allow approved apps on iOS devices. But to believe you’re 100 percent in the clear if you’re using an iOS device is a mistake.
Lookout has hired on a vice president of Federal Systems, Bob Stevens, as part of a company initiative to make the government workforce more productive through the secure use of mobile devices.
Today, the Blackhat movie hit theaters with its surprisingly realistic portrayal of hacking (save for the shanking and guns). But while we’re impressed with it’s accuracy, we know there are plenty of hacker myths that need to be aired.
2014 was the year of malware sophistication — new threats, monetization strategies, and distribution methods all surfaced and became legitimate issues.
That’s just one of our findings from this year’s Mobile Threat Report — Lookout’s deep dive into the world of mobile threats in 2014, which we are releasing today.
We looked into our dataset of the world’s mobile code, gathered anonymously from our 60 million sensors (our users!) around the globe. We analyzed this data and found a number of interesting trends:
And we expect that adversarial attention on the U.S. — a country that has traditionally flown under the mobile malware radar — will only continue in 2015.
Got thoughts on what next year might hold? Leave us a comment!
Sprechen sie deutsch? Klicken sie hier.
Parlez-vous français? Cliquez ici.
Today, privacy tools are of increased importance. They help people understand what kind of data they’re sharing and can help keep your personal information personal.
So it’s particularly egregious when a piece of malware pretends to protect a person’s privacy and, instead, steals their data.
Every year, Lookout harnesses the joyful holiday spirit of pitting employees against employees in an effort to gather and donate as many great toys as possible to the San Francisco Fire Fighters Toy Program.
Random Hacks of Kindness (RHOK), Lookout’s charity group, worked with the SF Fire Fighters and set up a major internal toy drive in which groups of Lookout employees compete against each other to find the best toys possible.
This year, spurred by healthy competition and some friendly trash talking amongst the executive team, Lookout employees collected over 1200 toys and $2000 for the SFFF Toy Program.
Lookout co-founder John Hering was in New York this week to speak at the New York Times’ Dealbook Conference. He sat down with columnist Andrew Ross Sorkin to talk about the Sony Hack, the cybersecurity landscape, and predictive security — the ability to predict and stop attacks before they happen.
Check out his talk here:
The year 2015 is going to be a landmark year for mobile. Indeed, all of the obvious truths we know about mobile are going to be challenged in significant ways. We’re going to see an increase in privacy concerns, malware in the U.S., and iOS attacks. But we will also witness big changes in the way the world thinks about security and the technology behind the protection we all depend upon and trust.
Our co-founders John Hering and Kevin Mahaffey have put together a list of our predictions, the way we see the mobile security industry moving in detail.
Please check them out and leave your predictions in the comments!
When you walk out of a retailer with a shiny new phone, you trust that it’s clean and safe to use. But this might not always be the case, as evidenced by the latest pre-loaded malware Lookout identified called DeathRing.
DeathRing is a Chinese Trojan that is pre-installed on a number of smartphones most popular in Asian and African countries. Detection volumes are moderate, though we consider this a concerning threat given its pre-loaded nature and the fact that we are actively seeing detections of it around the world.
Over the past two years, Lookout has tracked the evolution of NotCompatible. It was a compelling threat from the start, marking one of the first times hacked websites were used at a large scale to specifically target and infect mobile devices.
NotCompatible.C has set a new bar for mobile malware sophistication and operational complexity. The command infrastructure and communication perseveres and self-protects through redundancy and encryption, making it elusive and enduring. It’s an earthworm with its tail cut off that regenerates and thrives.