- Log In
Spring is here, which means it’s time to roll up your sleeves and do some serious cleaning. There’s more to tidy up than your house, though; your phone is probably overflowing with photos, apps and clutter you could do without. Here are six tips to help you freshen up your phone — once you’re done, your phone will thank you!
But we can’t do it without your help. We need your votes for Aaron’s RSA talk and here’s why:
The iOS App Store is not the impenetrable walled garden you think it is.
For years consumers have lifted up iOS as the safe mobile operating system. Comparatively, it does see much less malware than Android likely due to its rigorous manual testing of App Store apps and technological limitations that only allow approved apps on iOS devices. But to believe you’re 100 percent in the clear if you’re using an iOS device is a mistake.
Lookout has hired on a vice president of Federal Systems, Bob Stevens, as part of a company initiative to make the government workforce more productive through the secure use of mobile devices.
Today, the Blackhat movie hit theaters with its surprisingly realistic portrayal of hacking (save for the shanking and guns). But while we’re impressed with it’s accuracy, we know there are plenty of hacker myths that need to be aired.
2014 was the year of malware sophistication — new threats, monetization strategies, and distribution methods all surfaced and became legitimate issues.
That’s just one of our findings from this year’s Mobile Threat Report — Lookout’s deep dive into the world of mobile threats in 2014, which we are releasing today.
We looked into our dataset of the world’s mobile code, gathered anonymously from our 60 million sensors (our users!) around the globe. We analyzed this data and found a number of interesting trends:
And we expect that adversarial attention on the U.S. — a country that has traditionally flown under the mobile malware radar — will only continue in 2015.
Got thoughts on what next year might hold? Leave us a comment!
Sprechen sie deutsch? Klicken sie hier.
Parlez-vous français? Cliquez ici.
Today, privacy tools are of increased importance. They help people understand what kind of data they’re sharing and can help keep your personal information personal.
So it’s particularly egregious when a piece of malware pretends to protect a person’s privacy and, instead, steals their data.
Every year, Lookout harnesses the joyful holiday spirit of pitting employees against employees in an effort to gather and donate as many great toys as possible to the San Francisco Fire Fighters Toy Program.
Random Hacks of Kindness (RHOK), Lookout’s charity group, worked with the SF Fire Fighters and set up a major internal toy drive in which groups of Lookout employees compete against each other to find the best toys possible.
This year, spurred by healthy competition and some friendly trash talking amongst the executive team, Lookout employees collected over 1200 toys and $2000 for the SFFF Toy Program.
Lookout co-founder John Hering was in New York this week to speak at the New York Times’ Dealbook Conference. He sat down with columnist Andrew Ross Sorkin to talk about the Sony Hack, the cybersecurity landscape, and predictive security — the ability to predict and stop attacks before they happen.
Check out his talk here:
The year 2015 is going to be a landmark year for mobile. Indeed, all of the obvious truths we know about mobile are going to be challenged in significant ways. We’re going to see an increase in privacy concerns, malware in the U.S., and iOS attacks. But we will also witness big changes in the way the world thinks about security and the technology behind the protection we all depend upon and trust.
Our co-founders John Hering and Kevin Mahaffey have put together a list of our predictions, the way we see the mobile security industry moving in detail.
Please check them out and leave your predictions in the comments!