On-Prem or Cloud? Lessons from the Microsoft Exchange Attack

Organizations utilize on-premise software because they want full control. But it actually increases their risks.

Mobile Security Best Practices for Law Firms

Proper training will go a long way to reduce the risk to which your firm is exposed, as will having effective security in place.

Vulnerability Management is Hard Without a Data-Driven Approach

One of the most important actions you can take to keep your smartphones and tablets secure is to make sure their apps and operating systems are up to date.

checkm8 IOS Vulnerability | Mobile Threat Defense Needs

Based on millions of iOS users that have installed Lookout and Lookout for Work apps, more than 80% of iPhones are vulnerable.

Schneider Electric Secures 50k Devices with Lookout MES

By selecting Lookout Mobile Endpoint Security, Schneider Electric gained immediate visibility into the mobile security and risk posture of its mobile users.

Lookout & VMWare Partner to Tackle Mobile Threats

Lookout has completed its integration with the VMware Workspace ONE Intelligence platform, providing organizations with a consolidated view of their digital environment.

No items found.

iOS 16 Zero Day

"Apple recently released a software update to iOS 16.1 and iPadOS 16 to patch a zero-day kernel vulnerability identified as CVE-2022- 42827"

CVE-2022-3075

Google released a patch for a new zero-day vulnerability found in the Chromium open-source web browser project, which provides the codebase behind some popular web browsers.

iOS 15.6.1 Zero-Day

Apple released a software update to iOS and iPadOS 15.6.1 to patch a zero-day kernel vulnerability identified as CVE-2022-32917.

iOS 15.5 Vulnerabilities

Apple released a software update to iOS and iPadOS 15.5 to patch 35 issues, including two critical vulnerabilities identified by Lookout which grant control of the device.

CVE-2022-1633 – 1641

Researchers recently discovered and disclosed to Google nine vulnerabilities in Google Chrome for Android. The vulnerabilities are CVE-2022-1633 through CVE-2022-1641.

CVE-2022-1364

Google's Threat Analysis Group recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-1364.

CVE-2022-1096

A researcher recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-1096 in the V8 Javascript Engine component.

CVE-2022-0609

Google recently discovered and disclosed an exploitable vulnerability in Chromium, which is identified as CVE-2022-0609.

iOS 15.3 Vulnerabilities

Apple released an urgent software update to iOS 15.3 to patch a vulnerability in Apple’s WebKit browser engine, which enabled attackers to execute arbitrary code remotely.

Adobe Acrobat for Android

There has been a critical vulnerability in Acrobat Reader for Android devices that could enable an unauthorized user to execute arbitrary code executing on the user’s device.

iOS 15.0.1 Vulnerabilities

Apple released an urgent software update for iOS 15.0.1, in response to the latest zero-day vulnerability in the IOMobileFrameBuffer.

iOS 14.8 Vulnerabilities

Apple released an urgent software update for iOS 14.7 to patch a vulnerability that was found to be exploitable by attackers using the surveillanceware known as Pegasus.

Preinstalled Android Apps

A number of apps that come preinstalled on Android devices were found to have vulnerabilities that could be exploited on any Samsung device.

Pulse Secure VPN

Several vulnerabilities discovered in the Pulse Secure VPN are being exploited by threat actors to bypass authentication and install malware in enterprise infrastructure.

iOS WebKit Vulnerabilities

Apple released an urgent software update to iOS 14.4 to patch a vulnerability in Apple’s WebKit browser engine, which enabled attackers to perform arbitrary cross-scripting.

Chrome for Android Vulnerabilities

This vulnerability affects Chrome for Android v86.0.4240.185 and below. In the event of a successful exploit, the actor could access any capability that the browser has.

Instagram for Android Vulnerabilities

This vulnerability in Instagram for Android app versions prior to 120.0.0.26.128 could allow attackers to take control of Instagram's functionality and permissions.

Firefox for Android Vulnerabilities

Vulnerability in Firefox for Android, found in the app's SSDP protocols, allows an attacker to trigger actions on a victim’s device if connected to the same Wi-Fi network.

Lookout + Google Cloud

Together, Lookout and Google ensure only trusted mobile devices have access to your sensitive data.

TikTok Pro

Right after India banned TikTok, a malicious app called TikTok PRO circulated the country through email and social media.

unc0ver Jailbreak

Unc0ver is a widely used jailbreak present in the market for some time, and more recently started taking advantage of an iOS kernel vulnerability discovered in 2019.

iOS Mail Vulnerabilities

A vulnerability in the native iOS Mail app allowed an attacker to execute an attack with zero or one-click.

Voatz App (App Defense)

The Voatz vulnerability, discovered by researchers at MIT, could allow hackers to see someone’s vote or even change their vote.

2019 IDC MarketScape for MAST

Lookout a Leader in IDC MarketScape for Mobile App Security Testing

iOS 14.3 Vulnerabilities

Apple announced three exploitable vulnerabilities in iOS 14.3. Two of them were tied to the Apple WebKit, while the third was a vulnerability of the device kernel.

MTD-MDM-MAM Comparison

This guide compares the cybersecurity capabilities of MTD, MDM, and MAM relative to the spectrum of mobile risk

Lookout for Financial Services in the EU

With Office 365 employees connect to corporate resources anytime from their personal devices. This introduces exposure to malicious apps, and OS vulnerabilities.

Mobile Vulnerability & Patch Management

Do you know why you need Lookout to reduce organizational risk from device and app vulnerabilities? Find out now.

SimJacker

SimJacker is a vulnerability in the SIM card of certain iOS and Android devices that is executed via a specially crafted SMS message sent to the target device.