Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Critical Mobile Security Capabilities Everyone Needs

One thing that 2020 taught us is that you can do anything with a mobile device. My smartphone and tablet have become my go-to for shopping, banking, watching TV and video chatting with family and friends. I’m also getting a lot of work done on them. Basically it has become the center of both my personal and professional lives. Here’s the dilemma a lot of organizations are facing: while away from the office, your workers are using their mobile devices to stay productive.

2021 Cybersecurity: Mitigating Mobile Security Risks for CISOs

Cybersecurity has always been a significant challenge for businesses, mostly due to the increasing financial and reputational cost of data breaches. As a result, there has been a consistent rise in tactics and technologies used to combat these threats. These methods fulfill the need for better, smarter ways to augment enterprise-level security and minimize mobile security risks.

Problematic JavaScript Vulnerabilities And Their Fixes Every Developer Should Know

A web developer’s ultimate goal is to not only develop a website or an app that is aesthetically and functionally stunning but highly secure as well. Cybersecurity is inevitable and no end-user would want to have an app that could breach or compromise their data security and integrity (no matter how useful the app is). With hackers and middlemen working on creative ways to explore vulnerabilities, it is on developers like us to take charge and be a step ahead of them.

Exploring intent-based Android security vulnerabilities on Google Play

Our phones know a lot about us, so it’s important we can trust them. After discovering and then publishing our findings on SourMint — the malicious iOS ad SDK — the Snyk Security Team decided to dig deeper in the Android ecosystem. To do so, we leveraged Snyk Code to analyze and search for vulnerabilities in applications uploaded to the Google Play store.

Safeguard Against Account Takeovers with Endpoint-to-cloud Security

Not long ago, amid the Microsoft Exchange Server attacks, Lookout Chief Strategy Officer Aaron Cockerill wrote about why cloud apps are more secure than their on-premise counterparts. That’s a really important lesson and an initial step towards securing your organization. Here’s part two of that narrative: you also need dedicated security to ensure that your cloud infrastructure and apps are secure.

Device management blind to 125 percent increase in financial sector phishing attacks

As guardians of valuable monetary assets and highly sensitive data, financial institutions are the perfect target for cybercriminals. According to IBM, the financial services sector was the number one target of cyberattacks in 2020 among all industries. This means these organizations continue to be challenged and invest heavily in both people and technology to make sure they can withstand attacks of any type.

Lookout Named Best Mobile Security Solution by the SC Awards

For the last 25 years, SC Media’s SC Awards program recognizes the people, products and companies forging the cybersecurity industry’s future and advancing the cause of safe and secure commerce and communications. I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile Security Solution of 2021.

FluBot: Malware as a Service Meets Mobile Phishing

Recently, Europeans were hit by an influx of SMS texts claiming to be package delivery notifications. It turns out these messages were orchestrated by threat actors seeking to distribute malicious apps laced with the banking trojan FluBot, also known as Cabassous. Once the victims download the malware, the app can intercept SMS messages, steal contact information and display screen overlays to trick users into handing over their credentials.

How to cyber security: 5G is not magic

5G is faster than its predecessor but that doesn’t change the approach to software security for your applications. Some wild claims have been made about 5G networking. I’ve heard mention of self-healing factories and smart highway systems. While such things might be possible, there’s nothing magical about 5G. In essence, it’s just faster wireless networking than we’ve had before. That’s nice, but hardly revolutionary.

Assessing the state of mobile application security through the lens of COVID-19

Are today’s mobile apps secure or do they offer opportunities for attackers? Learn about the state of mobile application security in our new report. Synopsys recently released a report, “Peril in a Pandemic: The State of Mobile Application Security,” produced by its Cybersecurity Research Center (CyRC), examining the state of mobile application security during the COVID-19 pandemic.