your data, today.
Explore how to unleash business innovation with easier and more effective data control.

Explore how to unleash business innovation with easier and more effective data control.
your data, today.
Explore how to unleash business innovation with easier and more effective data control.

Keep everything running smoothly through mergers and acquisitions.
Move to the cloud faster while improving security and productivity.
Everything you need to detect and mitigate threats in real time.
Workers and data are everywhere, your security should be too.
Collaborate securely and productively from anywhere in the world.
Workers and data are everywhere, your security should be too.
Protect student data without sacrificing privacy.
Meet demand for Zero Trust mandates with unified data protection.
Provide digital-first services while protecting customer data.
Protect patient data, minimize risk, and maximize compliance.
Protect valuable data and IP no matter where it goes.
Securely move to the cloud and safeguard mobile devices.
Explore how to unleash business innovation with easier and more effective data control.
Explore how we're creating the future of data security and ensuring peace of mind for all.

Find insights and information about keeping your data safe.
Find the latest community events, webinars, podcasts and more from Lookout.
Explore all business data security related resources to uncover information, insights, and more.
Enjoy our Security Soapbox podcast, listen in to learn about the latest threat intel and more.
Explore our many conversations with top industry leaders in cybersecurity.
View our ever growing library of informative videos, use-case explanations and more.
Meet our team and learn from cybersecurity experts in one of our upcoming events.
Latest news, threat info, and security updates from the leaders in cloud security.
On-Prem or Cloud? Lessons from the Microsoft Exchange Attack
Organizations utilize on-premise software because they want full control. But it actually increases their risks.
Mobile Security Best Practices for Law Firms
Proper training will go a long way to reduce the risk to which your firm is exposed, as will having effective security in place.
Vulnerability Management is Hard Without a Data-Driven Approach
One of the most important actions you can take to keep your smartphones and tablets secure is to make sure their apps and operating systems are up to date.
checkm8 IOS Vulnerability | Mobile Threat Defense Needs
Based on millions of iOS users that have installed Lookout and Lookout for Work apps, more than 80% of iPhones are vulnerable.
Schneider Electric Secures 50k Devices with Lookout MES
By selecting Lookout Mobile Endpoint Security, Schneider Electric gained immediate visibility into the mobile security and risk posture of its mobile users.
Lookout & VMWare Partner to Tackle Mobile Threats
Lookout has completed its integration with the VMware Workspace ONE Intelligence platform, providing organizations with a consolidated view of their digital environment.
iOS 16 Zero Day
"Apple recently released a software update to iOS 16.1 and iPadOS 16 to patch a zero-day kernel vulnerability identified as CVE-2022- 42827"
CVE-2022-3075
Google released a patch for a new zero-day vulnerability found in the Chromium open-source web browser project, which provides the codebase behind some popular web browsers.
iOS 15.6.1 Zero-Day
Apple released a software update to iOS and iPadOS 15.6.1 to patch a zero-day kernel vulnerability identified as CVE-2022-32917.
iOS 15.5 Vulnerabilities
Apple released a software update to iOS and iPadOS 15.5 to patch 35 issues, including two critical vulnerabilities identified by Lookout which grant control of the device.
CVE-2022-1633 – 1641
Researchers recently discovered and disclosed to Google nine vulnerabilities in Google Chrome for Android. The vulnerabilities are CVE-2022-1633 through CVE-2022-1641.
CVE-2022-1364
Google's Threat Analysis Group recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-1364.
CVE-2022-1096
A researcher recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-1096 in the V8 Javascript Engine component.
CVE-2022-0609
Google recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-0609.
iOS 15.3 Vulnerabilities
Apple released an urgent software update to iOS 15.3 to patch a vulnerability in Apple’s WebKit browser engine, which enabled attackers to execute arbitrary code remotely.
Adobe Acrobat for Android
There has been a critical vulnerability in Acrobat Reader for Android devices that could enable an unauthorized user to execute arbitrary code executing on the user’s device.
iOS 15.0.1 Vulnerabilities
Apple released an urgent software update for iOS 15.0.1, in response to the latest zero-day vulnerability in the IOMobileFrameBuffer.
iOS 14.8 Vulnerabilities
Apple released an urgent software update for iOS 14.7 to patch a vulnerability that was found to be exploitable by attackers using the surveillanceware known as Pegasus.
Preinstalled Android Apps
A number of apps that come preinstalled on Android devices were found to have vulnerabilities that could be exploited on any Samsung device.
Pulse Secure VPN
Several vulnerabilities discovered in the Pulse Secure VPN are being exploited by threat actors to bypass authentication and install malware in enterprise infrastructure.
iOS WebKit Vulnerabilities
Apple released an urgent software update to iOS 14.4 to patch a vulnerability in Apple’s WebKit browser engine, which enabled attackers to perform arbitrary cross-scripting.
Chrome for Android Vulnerabilities
This vulnerability affects Chrome for Android v86.0.4240.185 and below. In the event of a successful exploit, the actor could access any capability that the browser has.
Instagram for Android Vulnerabilities
This vulnerability in Instagram for Android app versions prior to 120.0.0.26.128 could allow attackers to take control of Instagram's functionality and permissions.
Firefox for Android Vulnerabilities
Vulnerability in Firefox for Android, found in the app's SSDP protocols, allows an attacker to trigger actions on a victim’s device if connected to the same Wi-Fi network.
Lookout + Google Cloud
Together, Lookout and Google ensure only trusted mobile devices have access to your sensitive data.
TikTok Pro
Right after India banned TikTok, a malicious app called TikTok PRO circulated the country through email and social media.
unc0ver Jailbreak
Unc0ver is a widely used jailbreak present in the market for some time, and more recently started taking advantage of an iOS kernel vulnerability discovered in 2019.
iOS Mail Vulnerabilities
A vulnerability in the native iOS Mail app allowed an attacker to execute an attack with zero or one-click.
Voatz App (App Defense)
The Voatz vulnerability, discovered by researchers at MIT, could allow hackers to see someone’s vote or even change their vote.
2019 IDC MarketScape for MAST
Lookout a Leader in IDC MarketScape for Mobile App Security Testing
iOS 14.3 Vulnerabilities
Apple announced three exploitable vulnerabilities in iOS 14.3. Two of them were tied to the Apple WebKit, while the third was a vulnerability of the device kernel.
MTD-MDM-MAM Comparison
This guide compares the cybersecurity capabilities of MTD, MDM, and MAM relative to the spectrum of mobile risk
Lookout for Financial Services in the EU
With Office 365 employees connect to corporate resources anytime from their personal devices. This introduces exposure to malicious apps, and OS vulnerabilities.
Mobile Vulnerability & Patch Management
Do you know why you need Lookout to reduce organizational risk from device and app vulnerabilities? Find out now.