Lookout Life
Endpoint Security

April 17, 2016

min read

Can a Phone Be Hacked? Watch Lookout on 60 Minutes

Interested in getting more in-depth information on our attack demonstrations? Read about how we did the Wi-Fi attack here and the mobile malware attack here.

Tonight, 60 Minutes featured Lookout co-founder John Hering and a number of other well-known and respected security researchers demonstrating mobile attacks.

This snippet of conversation from the segment, captures the reality of mobile security:

60 Minutes’ Sharyn Alfonsi: “Is everything hackable?”

Hering: “Yes.”

A: “Everything?”

H: “Yes.”

A: “If somebody tells you, ‘You can’t do it’?”

H: “I wouldn’t believe them.”

As the segment continues a number of ways smartphones can be attacked are shown. For example, John explains the issues with spoofed Wi-Fi networks that, when connected to, could give an attacker a live view of the activity on your device. The segment also looks at an attack that uses only a phone number to spy on a targeted device.

Lookout provides safer solutions for everybody

At Lookout, we’ve been committed to helping the world become safer as it gets more connected since 2007. In that time we’ve developed a suite of products, including mobile apps for personal and enterprise security.

To detect mobile threats and protect your privacy you can download Lookout from the Google Play or App Store here:

For enterprise technology and security teams, there’s Mobile Threat Protection, Lookout’s mobile security solution for business, that integrates with existing MDM and EMM solutions to deliver comprehensive security for the mobile threat landscape.

Learn more about Mobile Threat Protection in this video that shows the lightweight endpoint apps, admin dashboard, and simple provisioning.

Mobile security is more important than ever

As tonight’s episode showed, phones can be hacked. While this is a true statement, it’s not a cause for alarm. Lookout is laser-focused on creating products that serve and delight not just IT administrators and CSOs, but individuals as well. You don't have to worry about mobile security, because we will. However, if you’ve been waiting for the right time to pay attention to mobile security, that time is now.