your data, today.
Explore how to unleash business innovation with easier and more effective data control.

The Data-Centric Cloud Security Platform built for a fluid digital world.
Cloud-native SSE data protection controlled by one flexible and easy-to-use interface.
Lookout Secure Cloud AccessLookout Secure Internet AccessLookout Secure Private AccessSecure and protect connected users, devices, and apps wherever they are.
Lookout Mobile Endpoint SecurityLookout Threat IntelligenceWorkers and data are everywhere your security can be too.
Move to the cloud faster while improving security and productivity.
Collaborate securely from anywhere in the world.
Everything you need to detect and mitigate threats in real time.
Save time and effort while improving privacy and compliance.
Keep everything running smoothly through mergers & acquisitions.
Protect student data without sacrificing privacy.
Meet demand for Zero Trust mandates with unified data protection.
Provide digital-first services while protecting customer data.
Protect patient data, minimize risk, and maximize compliance.
Protect valuable data and IP no matter where it goes.
Securely move to the cloud and safeguard mobile devices.
Explore how to unleash business innovation with easier and more effective data control.
Discover how to take back control of your personal digital information wherever it goes.
Discover how to take back control of your personal digital information wherever it goes.
Explore how we're creating the future of data security and ensuring peace of mind for all.

Explore how we're creating the future of data security and ensuring peace of mind for all.
Learn how we partner with leading companies to safeguard productivity in a privacy-first world.
Learn how we partner with leading companies to safeguard productivity in privacy-first world.
As a business or an individual, find insights and information about keeping your data safe.
Our latest news, information and perspectives.
Explore all business data security related resources to uncover information, insights, and more.
Explore how we help customers prosper.
Discover app threats worldwide.
Discover mobile threats worldwide.
Updates on the latest threats.
Endpoint-to-cloud unified data protection
Personal digital security solutions for consumers
As a business or an individual, find insights and information about keeping your data safe.
On-Prem or Cloud? Lessons from the Microsoft Exchange Attack
Organizations utilize on-premise software because they want full control. But it actually increases their risks.
Mobile Security Best Practices for Law Firms
Proper training will go a long way to reduce the risk to which your firm is exposed, as will having effective security in place.
Mobile EDR for Security Professionals by Security Professionals
Lookout has announced the introduction of threat hunting & research into the Lookout Security Platform. See how this changes the threat discovery landscape.
Vulnerability Management is Complicated Without a Data-Driven Approach
One of the most important actions you can take to keep your smartphones and tablets secure is to make sure their apps and operating systems are up to date.
checkm8 IOS Vulnerability | Mobile Threat Defense Needs
Based on millions of iOS users that have installed Lookout and Lookout for Work apps, more than 80% of iPhones are vulnerable.
Schneider Electric Secures 50k Devices with Lookout MES
By selecting Lookout Mobile Endpoint Security, Schneider Electric gained immediate visibility into the mobile security and risk posture of its mobile users.
Lookout & VMWare Partner to Tackle Mobile Threats
Lookout has completed its integration with the VMware Workspace ONE Intelligence platform, providing organizations with a consolidated view of their digital environment.
iOS 16 Zero Day
"Apple recently released a software update to iOS 16.1 and iPadOS 16 to patch a zero-day kernel vulnerability identified as CVE-2022- 42827"
CVE-2022-3075
Google released a patch for a new zero-day vulnerability found in the Chromium open-source web browser project, which provides the codebase behind some popular web browsers.
iOS 15.6.1 Zero-Day
Apple released a software update to iOS and iPadOS 15.6.1 to patch a zero-day kernel vulnerability identified as CVE-2022-32917.
iOS 15.5 Vulnerabilities
Apple released a software update to iOS and iPadOS 15.5 to patch 35 issues, including two critical vulnerabilities identified by Lookout which grant control of the device.
CVE-2022-1633 – 1641
Researchers recently discovered and disclosed to Google nine vulnerabilities in Google Chrome for Android. The vulnerabilities are CVE-2022-1633 through CVE-2022-1641.
CVE-2022-1364
Google's Threat Analysis Group recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-1364.
CVE-2022-1096
A researcher recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-1096 in the V8 Javascript Engine component.
Cyber Readiness and the Russia-Ukraine War
Listen in on this 5-minute Fridays episode where I discuss what’s going on in Ukraine and how organizations can be cyber ready.
CVE-2022-0609
Google recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-0609.
iOS 15.3 Vulnerabilities
Apple released an urgent software update to iOS 15.3 to patch a vulnerability in Apple’s WebKit browser engine, which enabled attackers to execute arbitrary code remotely.
Adobe Acrobat for Android
There has been a critical vulnerability in Acrobat Reader for Android devices that could enable an unauthorized user to execute arbitrary code executing on the user’s device.
iOS 15.0.1 Vulnerabilities
Apple released an urgent software update for iOS 15.0.1, in response to the latest zero-day vulnerability in the IOMobileFrameBuffer.
iOS 14.8 Vulnerabilities
Apple released an urgent software update for iOS 14.7 to patch a vulnerability that was found to be exploitable by attackers using the surveillanceware known as Pegasus.
Preinstalled Android Apps
A number of apps that come preinstalled on Android devices were found to have vulnerabilities that could be exploited on any Samsung device.
Pulse Secure VPN
Several vulnerabilities discovered in the Pulse Secure VPN are being exploited by threat actors to bypass authentication and install malware in enterprise infrastructure.
iOS WebKit Vulnerabilities
Apple released an urgent software update to iOS 14.4 to patch a vulnerability in Apple’s WebKit browser engine, which enabled attackers to perform arbitrary cross-scripting.
Chrome for Android Vulnerabilities
This vulnerability affects Chrome for Android v86.0.4240.185 and below. In the event of a successful exploit, the actor could access any capability that the browser has.
Firefox for Android Vulnerabilities
Vulnerability in Firefox for Android, found in the app's SSDP protocols, allows an attacker to trigger actions on a victim’s device if connected to the same Wi-Fi network.
Instagram for Android Vulnerabilities
This vulnerability in Instagram for Android app versions prior to 120.0.0.26.128 could allow attackers to take control of Instagram's functionality and permissions.
Lookout + Google Cloud
Together, Lookout and Google ensure only trusted mobile devices have access to your sensitive data.
TikTok Pro
Right after India banned TikTok, a malicious app called TikTok PRO circulated the country through email and social media.
unc0ver Jailbreak
Unc0ver is a widely used jailbreak present in the market for some time, and more recently started taking advantage of an iOS kernel vulnerability discovered in 2019.
iOS Mail Vulnerabilities
A vulnerability in the native iOS Mail app allowed an attacker to execute an attack with zero or one-click.
Voatz App (App Defense)
The Voatz vulnerability, discovered by researchers at MIT, could allow hackers to see someone’s vote or even change their vote.
Lookout CCA + GSuite Continuous Conditional Access
Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks.
2019 IDC MarketScape for MAST
Lookout a Leader in IDC MarketScape for Mobile App Security Testing
iOS 14.3 Vulnerabilities
Apple announced three exploitable vulnerabilities in iOS 14.3. Two of them were tied to the Apple WebKit, while the third was a vulnerability of the device kernel.
MTD-MDM-MAM Comparison
This guide compares the cybersecurity capabilities of MTD, MDM, and MAM relative to the spectrum of mobile risk
Three Ways Employees Are Putting Your Organization at Risk
Employees in government organizations use iOS, Android and ChromeOS devices to stay productive and increase productivity as they telework.
Lookout for Financial Services in the EU
With Office 365 employees connect to corporate resources anytime from their personal devices. This introduces exposure to malicious apps, and OS vulnerabilities.
Mobile Vulnerability & Patch Management
Do you know why you need Lookout to reduce organizational risk from device and app vulnerabilities? Find out now.
SimJacker
SimJacker is a vulnerability in the SIM card of certain iOS and Android devices that is executed via a specially crafted SMS message sent to the target device.
Mobile Threat Protection
Lookout Mobile Threat Protection is a security solution for your mobile workforce to view and defeat evolving mobile threats.