Thank you for your interest in Lookout

Stealth Mango & Tangelo Technical Report

Global 2000 Case Study

Read this report to learn:

  • About a new mobile malware family used in targeted surveillance campaigns against government officials, military, and activists.
  • Methods of attack, which include phishing campaigns against victims.
  • The data that was stolen including call records, audio recordings, device location information, text messages, and photos.
  • Details on the attackers whom we believe are Pakistani-based actors likely in the military.
  • Infrastructure details.

Find out how to bring mobile security and phishing protection to your enterprise today.

Contact Sales call_made

Gartner insights: four mobile security recommendations for CISOs

In the past year, Gartner has provided guidance on the differences between Enterprise Mobility...

Analyst Report Download summary

Why mobile risk is bigger than bad apps, phishing, and malware

In this data-based report, you'll benefit from a comprehensive overview of the real-world risk...

Whitepaper Read Research Report

Mobile Phishing: Myths and facts facing every modern enterprise today

Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is...

Whitepaper Download Whitepaper