Mobile 101


Five Critical Security Tips in Three Minutes or Less

These tips will help keep your device safe.

These tips will help keep your device safe.

What Is Phishing?

If you have an email account, odds are you've received a phishing message in your inbox before.

If you have an email account, odds are you've received a phishing message in your inbox before.

Get Started With Your New Smartphone!

Here's a quick checklist to make sure you aren't forgetting anything when you set up your shiny new device.

Here's a quick checklist to make sure you aren't forgetting anything when you set up your shiny new device.

Should You Worry About Getting a Cell Phone Virus?

Protect the valuable data on your phone by addressing these most talked about Android "viruses."

Protect the valuable data on your phone by addressing these most talked about Android "viruses."

A Mobile Menace

A user is 2.5 times more likely to download an app with malware than at the beginning of the year.

A user is 2.5 times more likely to download an app with malware than at the beginning of the year.

Are Android and Droid the Same Thing?

Even if they are like two peas in a smartphone pod, Android and Droid couldn't be more different.

Even if they are like two peas in a smartphone pod, Android and Droid couldn't be more different.

Mobile Security Glossary

Sometimes even the savviest smartphone user can come across an unknown term or two.

Sometimes even the savviest smartphone user can come across an unknown term or two.

How a Phone Is Phished

How to safely browse the web and avoid attacks

How to safely browse the web and avoid attacks

How Do Celebrities Get Hacked?

Celebrities are susceptible to the same mobile threats as normal people are, like phishing and malware.

Celebrities are susceptible to the same mobile threats as normal people are, like phishing and malware.

iPhone Users Care About Security, Too

You use your iPhone and iPad for just about everything, so follow these steps to protect your information.

You use your iPhone and iPad for just about everything, so follow these steps to protect your information.

Lookout Loves Apps

Lookout loves apps, so here's our short list of some of our favorites.

Lookout loves apps, so here's our short list of some of our favorites.

Malware Goes Mobile

It will only take 2 years for mobile threats to do what PC threats evolved to in 15 years.

It will only take 2 years for mobile threats to do what PC threats evolved to in 15 years.

Take the Money and Run: Mobile Banking on the Go

With a growing number of financial institutions offering mobile banking features, all of your money is traveling around with you.

With a growing number of financial institutions offering mobile banking features, all of your money is traveling around with you.

Mobile Banking Tips

It can be difficult to tell whether a payment app is safe or not, but there a steps you can take to stay safe.

It can be difficult to tell whether a payment app is safe or not, but there a steps you can take to stay safe.

A Brief History of Mobile Time

In only a few short decades, mobile technology has developed from laboratory experiments to mini-computers.

In only a few short decades, mobile technology has developed from laboratory experiments to mini-computers.

Mobile Security Means Physical Safety, Too

Common sense and situational awareness will help you avoid getting mugged for your phone. Here are our tips to keep safe.

Common sense and situational awareness will help you avoid getting mugged for your phone. Here are our tips to keep safe.

What Is a Mobile Threat?

Like viruses and spyware that can infect your PC, there are a variety of security threats that can affect mobile devices.

Like viruses and spyware that can infect your PC, there are a variety of security threats that can affect mobile devices.

Mobile Threats Around the World

We expose that the type and prevalence of mobile threats varies significantly based on geography.

We expose that the type and prevalence of mobile threats varies significantly based on geography.

What is Adware?

Adware is the most prevalent app-based mobile threat around the world today.

Adware is the most prevalent app-based mobile threat around the world today.

Lookout Presents Tech Hero

Instead of celebrating tech this holiday season, we're celebrating the people who help you make the most of technology.

Instead of celebrating tech this holiday season, we're celebrating the people who help you make the most of technology.

8 Tips for Protecting Your Phone in a Crowd

Protect your cell phone and the data on it no matter where you go.

Protect your cell phone and the data on it no matter where you go.

What to Do If Your Phone Is Stolen

Whether you have Lookout installed or not, practical tips to get a stolen phone back.

Whether you have Lookout installed or not, practical tips to get a stolen phone back.

Back to School Smartphone Guide

More and more students are planning on bringing their smartphone with them to class, here's how to keep them safe.

More and more students are planning on bringing their smartphone with them to class, here's how to keep them safe.