Lookout Obtains FedRAMP JAB P-ATO for SASE: What It Means for You
As the federal government continues to emphasize the importance of Zero Trust, Lookout has achieved a major milestone to aid in those efforts.
Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign
Security researchers at the Lookout Threat Labs have identified a new rooting malware distributed on Google Play, the Amazon Appstore and the Samsung Galaxy Store.
When Legit Apps Turn Malicious. Hint: It Happens Often
A popular Android app Barcode Scanner was recently found to be infected with adware. After an update in late 2020, it started pushing advertising to users without warning.
Top Three Threats Facing US Government Employees Amid Telework
All levels of government are increasingly exposed to credential-harvesting mobile attacks as well as risks from adware and outdated operating systems.
New Spyware Used by Sextortionists | iOS/Android Blackmail
The Lookout Threat Intelligence team has discovered a new mobile app threat targeting iOS and Android users in Chinese speaking countries, Korea and Japan.
Lookout and AT&T Delivering Advanced Security
AT&T has announced new security features for customers who subscribe to its Unlimited Elite and Extra plans, as well as its Unlimited Business Performance and Elite plans
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs
The Lookout Threat Intelligence team has discovered four Android surveillanceware tools used as part of a much larger mAPT (mobile advanced persistent threat).
New Threat - Commercial Surveillanceware Operators Exploit COVID-19
Are cybercriminals and scammer's taking advantage of increased communication around COVID-19? Discovery shows new surveillanceware exploits the pandemic.
Lookout Partners With Google To Protect Users From App Risk
With this partnership, Lookout can stop malicious apps before they become a threat by scanning apps submitted to the Google Play Store before they are available for download.
New Surveillanceware Developed by Russian Defence Contractor
Monokle is a new and sophisticated set of custom Android surveillanceware tools developed by the Russia-based company, Special Technology Centre, Ltd.
Adware "BeiTaAd" Found Hidden in Popular Applications
BeiTaAd is a well-obfuscated advertising plug-in hidden within a number of popular applications in Google Play. Discover more about this mobile threat.
Mobile Banking Continues to be Primary Target for Trojan Attacks
Lookout continues to see advanced trojans targeting mobile banking users resulting in customer data compromise and fraudulent transactions.
Tropic Trooper Goes Mobile With Titan Surveillanceware
Learn about Titan, a family of sophisticated Android surveillanceware apps surfaced by Lookout's automated analysis that is linked to the same actors behind Tropic Trooper.
FrozenCell: Multi-Platform Surveillance Campaign Against Palestinians
Lookout researchers have discovered a new mobile surveillanceware family, FrozenCell. The threat is likely targeting employees of various Palestinian agencies and facilities.
XRAT Malware Tied to "Xsser/MRAT" Surveillance
Lookout have identified a mobile trojan called xRAT with extensive data collection functionality and the ability to remotely run a suicide function to avoid detection.
3 Insights From the Gartner Hype Cycle for Mobile Security 2017
Gartner recently released its July 2017 Hype Cycle for Mobile Security 2017, confirming that mobile threat defense (MTD) has matured as a key enterprise security technology.
Data Compromise via Mobile Threats: Enterprises Are Facing Attacks
Mobile threats are more complex than a piece of malware in a third-party app store. In this blog post we dissect the “threats” component of the Mobile Risk Matrix.
Mobile Safari Scareware Campaign Thwarted
ViperRat - Mobile APT Targeting Israeli Defense Force
Using data collected from the Lookout global sensor network, the Lookout research team was able to gain unique visibility into the ViperRAT malware.
Good News: Lookout Can Protect You From XcodeGhost
Lookout protects you from XcodeGhost by automatically detecting and alerting you to the offending app. See how iOS users are being protected with Lookout.
The New NotCompatible | Threat to Enterprise Networks
Over the past two years, Lookout has tracked the evolution of NotCompatible, which has set a new bar for mobile malware sophistication and operational complexity.
The Mobile Enterprise: Where the Risk Is Bigger Than Malware and Phishing
In this data-based report, you'll benefit from a comprehensive overview of the real-world risk landscape facing businesses like yours.
Know Thy Enemy: What Is Pegasus and What Can You Do?
Veteran of the cybersecurity industry, Joseph Davis of Microsoft, explains how spyware came to be, its implications and how you can protect yourself and your organization
Colonial Pipeline Ransomware Attack
The Colonial Pipeline ransomware attack demonstrated how cybercrime groups exploit diminishing visibility, legacy security systems, and mobile devices to extort money.
The Supply Chain Reaction: Lessons from SolarWinds
In this episode, Tim LeMaster, Director of Systems Engineering at Lookout, discusses SolarWinds and how a Zero Trust security model can safeguard your infrastructure.
SolarWinds: Software Supply Chain Attack
Solarwinds showed the effectiveness of a software supply chain attack, an effective tactic for compromising a high volume of devices with a single infected software update.
Mobile Security Made Easy for Small Business
Securing corporate data from these risks shouldn’t be a roadblock for productivity, but rather a set of practices to ensure employees aren’t putting their organizations at risk.
Lookout for Personal & Small Business
We secure mobility for the world's largest enterprises, the highest levels of government, hundreds of thousands of small businesses, and tens of millions of individuals.
Mobile APT Attack on Amazon CEO
Amazon's CEO was targeted by a mobile advanced persistent threat (APT) that enabled the attacker to steal data with a compromised video file sent to the victim via WhatsApp.
Lookout for Small Business + Microsoft Office 365
Small businesses are increasingly relying on Microsoft Office 365 to enable their employees to work how they want and where they want. However, this comes with a big risk.
Don’t Let Mobile Devices Cause the Next Big Heist
Financial services industry employees and customers rely on tablets and smartphones and threat actors are constantly finding ways to exploit them to access cloud infrastructure.
Lookout for App Defense PSD2 Mobile Banking Regulation
Key security goals set by the Regulatory Technical Standards for PSD2 are the ability to detect malware and provide a security to mitigate risk on user devices.
Lookout Integrations and Alliances Overview
As the leading provider of mobile security, Lookout integrates with tools that help organizations benefit from unified security, visibility, and management of endpoints.
Lookout and Microsoft Partnering To Enable Secure Mobility
Organizations are increasingly adopting mobile management strategies for mobile, but in today’s evolving threat landscape it’s more challenging than ever to stay secure.
Lookout Security Intelligence Team Discovery of ArmaSpy
ArmaSpy was a surveillance family, which appears to have been targeting Iranian users since late 2016 with new samples discovered as recently as mid-2019
Lookout Security Intelligence Team's Discovery of BeiTaAd RTD
BeiTaAd is a well-obfuscated advertising plugin that forcibly displayed ads on the user’s lock screen, triggered video and audio advertisements even while the phone is asleep.
Nation State Mobile Surveillanceware Using Phishing To Con Victims
Lookout Security Intelligence has discovered a set of custom Android and iOS surveillanceware tools we’re respectively calling Stealth Mango and Tangelo.
Proactively Protect Your Customers’ Data and Account Credentials on Mobile
Smartphone apps have become an integral part of everyday life. Almost every company is now investing in mobile apps to deliver innovative services to their customers.
Protect Your Customers’ Data and Account Credentials on Mobile
Mobile apps have become an integral part of everyday life. To win consumer engagement, almost every company is investing in mobile apps to deliver services to customers.