New

Scammers Are Impersonating Singapore Post With Phishing Messages

Throughout 2022, threat actors have been masquerading as the postal service Singapore Post (SingPost) and one of Singapore’s leading telecommunications companies Singtel.

The Internet-Based Threats Putting Your Organization at Risk

As you embrace the productivity boost that comes with using the internet as your default corporate network, you need to stay vigilant against these internet-based threats.

Lookout Study Identifies an Ongoing Consumer Scam Surge

To shed light on the world of digital scams, Lookout commissioned a survey that spoke to 1,000 U.S. consumers to understand where people encounter scams.

New

Beyond BEC: How Modern Phishing Has Evolved Past Email

Business email compromise (BEC) is big business for malicious actors. According to the 2021 FBI Internet Crime Report, BEC was responsible for $2.4 billion in cyber crimes.

New

Work and Life Have Intertwined: Why You Need to Protect Against Phishing

Don't bring your personal life into the office; don't bring your work stuff home — these were already difficult tasks prior to the 2020 pandemic.

New

How to Protect Against SMS Phishing and Other Similar Attacks

Whenever a breach occurs, we always need to think about the lessons that can be learned. Here are my tips for keeping your organization safe from mobile phishing attacks.

New

When it Comes to Tax Season, There is No Safe Haven From Phishing

Tax-related phishing attacks have become so pervasive that the IRS issued an annual advisory as a warning to businesses and consumers.

New

Cyber Readiness and the Russia-Ukraine War

The cyber threats initially directed at Ukrainian government bodies and infrastructure could easily be targeted at other nations.

The Olympics and Burner Phones: What About the Safety of That QR Code?

While QR codes make navigating activities at the Games easy and contactless, it creates opportunities for them to be abused for phishing purposes.

New
IDC

Lookout CASB Named Major Player in 2021

IDC MarketScape validates Lookout for its Zero Trust solution that spans CASB, Zero Trust Network Access (ZTNA), Data Loss Prevention (DLP) and endpoint security.

New

Telkomsel Partnership to Deliver Mobile Device/App Security

We're excited that Telkomsel has partnered with Lookout to launch Telkomsel Mobile Endpoint Protection (MEP) and Telkomsel Mobile App Protection (MAP).

The Zero Trust Lesson Behind Mobile Phishing Against Australian Officials

Australia recently confirmed that a series of mobile phishing attacks were successfully executed on senior officials. Discover more at Lookout today.

New

FBI Cries Foul on Rise in “Vishing” Volume

On August 20, the Federal Bureau of Investigation (FBI) issued a warning about the rise in vishing attacks.

Phone Spear Phishing Ruffles Feathers at Twitter

Your employees’ phones and tablets have as much access to your data as a laptop or desktop does because they need to stay productive.

New

Got MDM? Here Are Five Reasons Why You Still Need Mobile Security

MDM is a valuable component of an organization’s mobile strategy. But you also need mobile security to make sure your sensitive data is protected.

New

Mobile Phishing Is Spiking Around the World

Here at Lookout, we often work with organizations on their cybersecurity needs depending on geographical or industry sector priorities.

New

Mobile Phishing Encounters Surged by 37% Amid Shift To Work-From-Home

Mobile Phishing Spotlight Report - Lookout revealed that enterprise mobile phishing encounter rates surged 37% between the last quarter of 2019 and the first quarter of 2020.

New

The Mobile Risks Beyond Business Email Compromise

BEC is a phishing attack. With the rise of smartphones and tablets, malicious messages can be delivered in a number of other ways. Learn more today.

Achieving Unified Endpoint Security: Lookout and VMware Carbon Black

With this UES solution, security teams can use a centralized dashboard to monitor the security of all endpoints accessing resources – both mobile and fixed endpoints.

Inside Look Into Phishing Campaign Targeting Mobile Banking

Lookout Phishing AI discovered a phishing campaign targeting customers via SMS messaging to lure them to fake websites of well-known Canadian and American banks.

New

Phishing Attack Targeting UN Discovered by Lookout Phishing AI

Lookout Phishing AI has detected a mobile-aware phishing campaign targeting non-governmental organizations around the world, including UNICEF.

Protecting Government Agencies From Phishing Attacks

Lookout Phishing & Content Protection is designed to keep the public sector secure from phishing attacks in a mobile-first world. Learn more today.

Protecting the Financial Services Industry From Phishing Attacks

Lookout Phishing and Content Protection is designed to keep financial services secure from phishing attacks in the mobile-first, cloud-first and perimeter-less world.

Protecting the Healthcare Industry From Phishing Attacks

Lookout Phishing & Content Protection is designed to keep healthcare organizations secure from phishing attacks in a mobile-first world. Learn more today.

New

5 Steps in the Mobile Phishing Kill Chain

In order for enterprises to protect their users and corporate data from modern phishing attacks, they must first understand how mobile phishing attacks work.

New

Understanding Phishing Threats in a Post-Perimeter World

Industry experts, enterprise and government security decision-makers discuss how to secure both the private and public sector from phishing threats.

New

Mobile Phishing Protection: How To Defend Against HTTPS Phishing Attacks

With Lookout deployed, enterprises have comprehensive mobile phishing protection, ensuring that their corporate data is secure in today’s mobile-first world.

Phishing Sites Distributing IOS & Android Surveillanceware

Lookout researchers have been tracking Android and iOS surveillanceware, that can exfiltrate contacts, recordings, photos, & more. Discover what was found.

New

Phishing AI Discovers New Mobile-First Phishing Campaign

Lookout Phishing AI reports a new, sophisticated phishing kit designed for mobile users targeting Verizon customers.

What is Lookout Phishing AI?

Lookout Phishing AI detects the early signals of phishing, protects end users from visiting such sites as they come up, and alerts the targeted organizations.

New

Lookout Researchers Disable Android Malware

Lookout researchers have disabled DressCode, an Android malware family, with their click fraud business model and malware designed to evade detection in novel ways.

New

Texts and Their Impact on Election Campaign Security

Lookout recognized that mobile devices could influence the elections, so that is why we held a special briefing on Capitol Hill in early October.

2018 Gartner Market Guide for Mobile Threat Defense

Gartner Market Guide for Mobile Threat Defense has a message: “Security and risk management leaders should leverage MTD to address evolving mobile security needs."

New

Stealth Mango and Tangelo | Surveillanceware Stealing Data

Lookout Security Intelligence has discovered Android and iOS surveillanceware tools targeting govt. officials, diplomats, military personnel, and activists.

New

Mobile Phishing: The Biggest Unsolved Problem in Cybersecurity

Mobile phishing brings together new channels for phishing employees and reduced screen size, causing one of the biggest problems businesses have faced in cybersecurity yet.

New

Mobile Persistent Threat Actor Running Global Espionage Campaign

Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a persistent and prolific actor running a global espionage campaign.

Securing Productivity from Anywhere

As we adapt to permanent hybrid working there is a need to keep employees productive on any device while they work with corporate data across multiple sources.

Energy Industry Threat Report

The energy industry is a prime target for attacks as mobile threats like phishing and app encounter rate is higher than other industries. Discover what these threats mean.

The Pharmaceutical Threat Report

Access the Pharmaceutical Threat Report to better understand the risks mobile devices have introduced into your organization with Lookout today.

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Lookout data reveals that U.S. government organizations are increasingly targeted by credential stealing mobile attacks and exposed to hundreds of vulnerabilities.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

Mobile Security for State and Local Agencies

Lookout Security expert Jose Garcia covers strategies for Mobile Endpoint Security and provides information on mobile security, BYOAD, and the emerging threat landscape.

Gone Phishing? How Hackers Use Mobile Devices As Bait

Learn why mobile devices are a key target for threat actors looking to gain access to your key corporate infrastructure.

From the Frontlines – Threats for Your Mobile Fleet

Hear first hand from industry leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile cloud services.

Trends and Statistics for Mobile Phishing in the Enterprise

Employees working outside of their corporate perimeters, coupled with the shift to cloud-based services, opens a whole new door of vulnerabilities. Namely, phishing threats.

The Latest Guidance To Secure Mobile Devices

NIST has released Special Publication (SP) 800-124: Guidelines for Managing the Security of Mobile Devices in the Enterprise.

How Are Attackers Targeting Mobile Devices?

With employees accessing O365, G Suite, Salesforce, and other services where attackers see an opportunity. Join Lookout and Eurofins to learn from the hacker's perspective.

The Mobile Enterprise: Where the Risk Is Bigger Than Malware and Phishing

In this data-based report, you'll benefit from a comprehensive overview of the real-world risk landscape facing businesses like yours.

The Twilio Breach and Phishing: Lessons Learned

Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus.

Lookout Security Platform Bundles Brochure

Because they now sit at the intersection of your work and personal lives, mobile devices are with you from the moment you wake up to when you go to sleep.

Civilian Cloud Exchange – Industry Perspectives

Over the last year, browser-based attacks have increased as more employees worked remotely.

A Day in the Life of Manufacturing IP

5 security gaps driven by digital transformation

U.S. Federal Mobile Threats

Lookout analyzed its mobile security data to provide a view into the current mobile security risks facing US Federal government mobile users.

Preview Lookout Phishing and Content Protection

See how Lookout Phishing and Content Works and what it looks like to the end user.

Addressing Threats to U.S. Critical Infrastructure

Nextgov editor James Hanson recently sat down with Aaron Cockerill for a virtual conversation shaped by today’s topics of critical infrastructure and cybersecurity threats.

How Manufacturers Can Mitigate Mobile Phishing Risks

From the inherent risks of cloud apps to the ongoing need to protect intellectual property and maintain industry compliance. Learn how to protect your manufacturing business.

EA Games Credentials Leaked via Slack Cookies

Attackers were able to gain access to EA's infrastructure with employee credentials in cookies from Slack and exfiltrate almost 1TB of data.

Kiersten Todt on Securing the Public Sector

In this episode, we’re joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security to discuss top cybersecurity challenges

Flubot Smishing

Attackers are using phone numbers leaked from Facebook to socially engineer mobile users into downloading malicious apps infected with the FluBot banking trojan

Lookout Mobile Endpoint Security

Security on mobile devices is often overlooked, creating a gap in your security architecture. Don't overlook the most used endpoint.

Modern Endpoint Protection

Traditional endpoint protection does not protect all of your endpoints, learn how Lookout protects against app, device, and network threats.

Mobile Phishing Attacks on Australian Government

Australian government officials were targeted by a mobile phishing campaign through Telegram and WhatsApp, where attackers could send messages on their behalf.

Office 365 Account Takeovers

The expanded remote workforce has increased organizations’ threat surface in the cloud, which resulted in a surge of attacks and breaches on Microsoft Office 365 services.

Cybercriminals Want Your Organization’s Login Credentials

Read why government agencies need protection against endpoint threats.cDownload the infographic now to get the stats

Your App Is Your Business

Embed security into the apps your patients and staff use to protect your practice.

How We Empower Your Attorneys to Securely Telecommute

Lookout protects your legal practice against mobile and phishing attacks.

Don’t Let Mobile Devices Tip the Scales

To better secure your firm, understand the threats mobile devices introduce.

How We Protect Law Firms From Phishing

Lookout phishing secures your attorneys from phishing without violating their privacy.

Lookout Protects Against Mobile Phishing Threats

Alex Gladd, Principal Product Manager at Lookout discussed why it is important to have visibility into phishing threats and how Lookout Phishing and Content protection can help

Cybercriminals Want Secret Pharma Recipes

Learn how to mitigate risks of a data breach across your supply chain.

Mobile Threats Are Evolving. Is Your Security?

The rise in mobile device use has facilitated an increase in mobile security concerns.

A Massive Threat on a Small Screen

We treat our mobile devices as a trusted device.

It’s All About Phishing

Tune in to find out how the likes of WhatsApp, Twitter, and Tinder have made phishing so dangerous on the mobile device.

Twitter Phone Spear Phishing

This Twitter phone spear phishing attack compromised the accounts of influential individuals and exemplifies the effectiveness of voice phishing, also known as vishing.

Federal Systems Integrator Secures Against Mobile Phishing

“Lookout enables people to work the way they want on their phones,” says security architect.

Chinese Surveillanceware

The Lookout Threat Intelligence team discovered four Android surveillanceware tools used to target the Uyghur ethnic minority group.

Mobile Threats: NotCompatible.C

Mobile device attacks are highlighting security shortcomings and exposing sensitive data and personal information at an alarming rate.

Mobile Security Made Easy for Small Business

Securing corporate data from these risks shouldn’t be a roadblock for productivity, but rather a set of practices to ensure employees aren’t putting their organizations at risk.

Identifying Phishing Attacks Targeting Verizon Customers

Lookout recently discovered a new phishing attack targeting Verizon customers. The attacker developed a mobile specific site designed to resemble a Verizon app.

Lookout for Personal & Small Business

We secure mobility for the world's largest enterprises, the highest levels of government, hundreds of thousands of small businesses, and tens of millions of individuals.

Lookout Phishing and Content Protection

Phishing is the primary tool used by attackers to gain access to your organization’s network. Learn more about Lookout Phishing and Content Protection.

Lookout + Trustonic Partnership Brief

Mobile apps have become a key part of everyday life to manage everything from booking travel to handling finances. This rise has also led to more attacks.

Prevent Phishing Campaign Demo Video

Lookout has tracked the evolution of the cybercrime group responsible and the increased technical sophistication of the latest variant, NotCompatible.C.

Post-Perimeter Security for Field Agents

Survey reveals phishing attacks targeting remote government field agents on mobile devices.

The Four Biggest Threats to Financial Services

With mobile as a catalyst for digital transformation in financial services, organizations must secure all users, devices, apps, and data —from endpoints to the cloud.

How Lookout Phishing and Content Protection Works

Phishing is the primary tool used by attackers to gain access to your organization’s network. Lookout data shows that up to 25% of employees are fooled in phishing tests.

Lookout for Small Business + Google G Suite

Enabling secure productivity of your mobile workforces.

Lookout for Small Business + Microsoft Office 365

Small businesses are increasingly relying on Microsoft Office 365 to enable their employees to work how they want and where they want. However, this comes with a big risk.

Mobile App Threat Killchain

Mobile app threats are prevalent and can be difficult to detect. The most common examples are sideloaded and unsecured apps, but there are many other forms.

Mobile Phishing Killchain Infographic

Lookout defends mobile users against phishing, app, device, and network-based attacks. By protecting users, Lookout secures the corporate data accessed from those devices.

Don’t Let Mobile Devices Cause the Next Big Heist

Financial services industry employees and customers rely on tablets and smartphones and threat actors are constantly finding ways to exploit them to access cloud infrastructure.

Lookout App Defense SDK

Smartphone apps have become an integral part of everyday life. Proactively protect your customers’ data and account credentials on mobile with Lookout App Defense.

Lookout Integrations and Alliances Overview

As the leading provider of mobile security, Lookout integrates with tools that help organizations benefit from unified security, visibility, and management of endpoints.

Three Ways Employees Are Putting Your Organization at Risk

Employees in government organizations use iOS, Android and ChromeOS devices to stay productive and increase productivity as they telework.

Lookout and Microsoft Partnering To Enable Secure Mobility

Organizations are increasingly adopting mobile management strategies for mobile, but in today’s evolving threat landscape it’s more challenging than ever to stay secure.

Lookout Mobile Phishing and Content Protection

Find out how PCP protects organizations against phishing attacks and inappropriate content.

Attack Targeting UN and NGOs

This campaign targeted non-governmental organizations around the world, including but not limited to UN and humanitarian organizations.

Lookout and Microsoft Securing BYOD Together

Together, Microsoft and Lookout provide comprehensive mobile security for Office 365 BYOD users

The Growing Threat of Mobile Phishing

In today’s post-perimeter world, critical data has moved to the cloud and employees are able to access it from any network and device, wherever they are in the world.

Fake Government Sites Targeting SMBs

Phishing AI's discovery of a campaign impersonating local County/State government sites in order to steal PII of business owners

Mobile-Only Canadian Banking Campaign

Phishing AI's early discovery of a mobile-only phishing campaign targeting Canadian banking customer

Attack Targeting AT&T Corporate Employees

Phishing AI discovered this campaign targeting AT&T employees on mobile devices.

Phishing AI Actively Detects Early Signals of Phishing Sites

Most cyber attacks targeting the enterprise begin with phishing. To combat this, Lookout developed Phishing AI to identify early signals of attacks and provide early warning.

Nation State Mobile Surveillanceware Using Phishing To Con Victims

Lookout Security Intelligence has discovered a set of custom Android and iOS surveillanceware tools we’re respectively calling Stealth Mango and Tangelo.

Lookout Mobile Phishing Protection: Visibility and Protection Against Sophisticated Mobile Phishing Threats

Phishing is the primary tool used by attackers to gain access to your organization’s network. Lookout data shows that 1 in 50 enterprise users are phished on mobile daily

Protect Your Customers’ Data and Account Credentials on Mobile

Mobile apps have become an integral part of everyday life. To win consumer engagement, almost every company is investing in mobile apps to deliver services to customers.

Evolution of Mobile Threat Actors With Michael Flossman

Learn how adversaries are using new tactics to target organizations and what Lookout's Mobile Endpoint Security solution can do to help.

Lookout and Microsoft Enterprise Mobility + Security

With Lookout and Microsoft Enterprise Mobility + Security (EMS), organizations are able to enable their employees while protecting sensitive data accessed by mobile devices.

Lookout Mobile Endpoint Security Datasheet

See how Lookout protects your organization against mobile threats and data leakage.