2014 was the year of malware sophistication — new threats, monetization strategies, and distribution methods all surfaced and became legitimate issues.
That’s just one of our findings from this year’s Mobile Threat Report — Lookout’s deep dive into the world of mobile threats in 2014, which we are releasing today.
We looked into our dataset of the world’s mobile code, gathered anonymously from our 60 million sensors (our users!) around the globe. We analyzed this data and found a number of interesting trends:
And we expect that adversarial attention on the U.S. — a country that has traditionally flown under the mobile malware radar — will only continue in 2015.
Got thoughts on what next year might hold? Leave us a comment!
Sprechen sie deutsch? Klicken sie hier.
Parlez-vous français? Cliquez ici.
Today, privacy tools are of increased importance. They help people understand what kind of data they’re sharing and can help keep your personal information personal.
So it’s particularly egregious when a piece of malware pretends to protect a person’s privacy and, instead, steals their data.
Every year, Lookout harnesses the joyful holiday spirit of pitting employees against employees in an effort to gather and donate as many great toys as possible to the San Francisco Fire Fighters Toy Program.
Random Hacks of Kindness (RHOK), Lookout’s charity group, worked with the SF Fire Fighters and set up a major internal toy drive in which groups of Lookout employees compete against each other to find the best toys possible.
This year, spurred by healthy competition and some friendly trash talking amongst the executive team, Lookout employees collected over 1200 toys and $2000 for the SFFF Toy Program.
Lookout co-founder John Hering was in New York this week to speak at the New York Times’ Dealbook Conference. He sat down with columnist Andrew Ross Sorkin to talk about the Sony Hack, the cybersecurity landscape, and predictive security — the ability to predict and stop attacks before they happen.
Check out his talk here:
The year 2015 is going to be a landmark year for mobile. Indeed, all of the obvious truths we know about mobile are going to be challenged in significant ways. We’re going to see an increase in privacy concerns, malware in the U.S., and iOS attacks. But we will also witness big changes in the way the world thinks about security and the technology behind the protection we all depend upon and trust.
Our co-founders John Hering and Kevin Mahaffey have put together a list of our predictions, the way we see the mobile security industry moving in detail.
Please check them out and leave your predictions in the comments!
When you walk out of a retailer with a shiny new phone, you trust that it’s clean and safe to use. But this might not always be the case, as evidenced by the latest pre-loaded malware Lookout identified called DeathRing.
DeathRing is a Chinese Trojan that is pre-installed on a number of smartphones most popular in Asian and African countries. Detection volumes are moderate, though we consider this a concerning threat given its pre-loaded nature and the fact that we are actively seeing detections of it around the world.
Over the past two years, Lookout has tracked the evolution of NotCompatible. It was a compelling threat from the start, marking one of the first times hacked websites were used at a large scale to specifically target and infect mobile devices.
NotCompatible.C has set a new bar for mobile malware sophistication and operational complexity. The command infrastructure and communication perseveres and self-protects through redundancy and encryption, making it elusive and enduring. It’s an earthworm with its tail cut off that regenerates and thrives.
Join us in welcoming Aaron Cockerill, VP of Enterprise Product, and David Helfer, VP of Worldwide Channel Development, into the Lookout family. As we continue our expansion into the large enterprise market, both Aaron and David will play an instrumental role in driving Lookout’s enterprise business forward.
With decades of product management and channel development experience from companies like Citrix and Juniper, Aaron and David are well equipped to lead Lookout’s charge in delivering solutions that large enterprises need in order to protect their businesses from mobile threats.
Hear from Aaron and David on why they joined Lookout and the problems they’re here to solve:
WireLurker, the iOS malware hitting headlines this morning, is just another proof point that malware authors are turning their heads toward the tiny computers living in your pockets.
Every day, Lookout analyzes more than 30,000 apps from around the world. While most are safe, a handful of them pose notable risks. Lookout assembled its first list of Relentless Mobile Threats to Avoid to shine a spotlight on the threats poised to affect millions of U.S. consumers, either because of their ubiquity, the extent of the damage they inflict, or both. They represent the threats that our researchers see as being among the most likely to land on your mobile phone. These threats can steal personal data, spy on consumers, and potentially cause people to lose control of their device.