San Francisco, CA, USA
Jul 20, 2021   |  By Hank Schless
Note from the author: This write-up is meant to provide an overview on Pegasus, why you should be concerned, how Lookout can help protect you and what actions security admins should take. For additional information, please read our full technical report. Lookout Customers: If you believe your organization or one of your employees has been compromised by Pegasus, please reach out to our support team immediately.
Jul 13, 2021   |  By Hank Schless
Leading American video game company Electronic Arts (EA) recently disclosed a breach that resulted in the theft of hundreds of gigabytes of data. The exfiltrated information included source code and software that power popular games like FIFA and Battlefield. What’s notable about this attack is that the attackers gained access to EA’s infrastructure through stolen Slack cookies that contained cached employee login credentials.
Jul 7, 2021   |  By Ioannis Gasparis
Cryptocurrencies, once the exclusive domain of an idealistic fringe movement, have recently become attractive to mainstream retail investors. During the COVID-19 pandemic, the valuation of cryptocurrencies rose exponentially, reaching a market capitalization of over $2 trillion. Cybercriminals are always looking for the path of least resistance to make money and cryptocurrencies are now in their crosshairs.
Jun 30, 2021   |  By Tony D'Angelo
The pandemic has accelerated digital transformation and telework on a scale never seen before. Employees are working from anywhere and collaboration in the cloud has skyrocketed. But this new environment has expanded the cyber attack surface, compromising critical U.S. infrastructure and lives of our citizens. The recent slew of major cyber attacks including SolarWinds, Microsoft Exchange and Colonial Pipeline, has moved cybersecurity improvements to the top of the agenda for the U.S.
Jun 28, 2021   |  By Sundaram Lakshmanan
I recently hopped on the Endpoint Enigma podcast to talk about virtual private networks (VPNs) and how they’ve been extended beyond their original use case of connecting remote laptops to your corporate network. Even in this new world where people are using personal devices and cloud apps, VPN continues to be the go-to solution for remote access and cloud access. After my conversation with Hank Schless, I was inspired to put some additional thoughts about VPN on paper.
Jun 24, 2021   |  By Firas Azmeh
Tablets and mobile devices have become an essential part of our daily lives, especially as 5G expands and remote work continues. This means these devices hold some of the most sensitive information that is tied to our digital identity. Today, I’m excited to share that we have expanded our consumer partnership with NTT DOCOMO to include identity monitoring and protection for DOCOMO’s subscribers across Android and iOS devices.
Jun 21, 2021   |  By Nancy Lam
Cloud-based solutions have become essential to how we work and play in the digital era. Many organizations continue their rapid embrace of cloud-based solutions to enable their employees the flexibility to work from anywhere. Cloud spending this year could hit $332 billion, up 23% from 2020, according to a forecast by Gartner, Inc. 1 The cloud has raised our expectations regarding productivity as organizations view the cloud as a true engine of competitive advantage.
Jun 10, 2021   |  By Mahesh Rachakonda
Software as a service (SaaS) apps have reshaped the way we stay productive. By having everything easily accessible in the cloud, we are able to get work done from anywhere and on any device. But, as we know, this flexibility has also introduced security challenges, as your data is also easier to reach for malicious actors. This is why the purchase of a cloud access security broker (CASB) is never that controversial. Most organizations understand that cloud apps require additional protection.
Jun 2, 2021   |  By Clayton Barnard
I’m pleased to share that Jamf and Lookout have formed a partnership to integrate Jamf Pro with Lookout Mobile Endpoint Security. Jamf provides mobile device management for Apple devices and specializes in serving IT professionals, schools and small businesses. Together, Lookout and Jamf enable your organization to deploy and provision iOS devices while protecting them against mobile threats such as phishing and network attacks.
May 27, 2021   |  By Hank Schless
Last year was an especially stressful time for healthcare systems. Not only were emergency rooms overwhelmed by patients, a number of them were also hit by system-crippling cyberattacks. According to Comparitech, in 2020 alone, 92 ransomware attacks affected over 600 healthcare organizations, exposing more than 18 million patient records. These attacks brought operations to a standstill for days or weeks at a time, costing the healthcare industry an estimated $20.8 billion.
Jun 24, 2021   |  By Lookout
In this short video, we walk through the challenges that IT and Security teams face, what requirements there are of CASB solutions, and how Lookout CASB helps solve these challenges.
May 21, 2021   |  By Lookout
Secure your agency's data by protecting your mobile endpoints
May 21, 2021   |  By Lookout
Learn best practices from government experts in today's mobile threat landscape
Jan 5, 2021   |  By Lookout
Bad guys attack your tablets and smartphones because they hold very sensitive data from our personal lives and from work. Aaron Cockerill and Mike Banic from Lookout talk about why its so lucrative for attackers to send phishing messages to your mobile devices.
Jan 5, 2021   |  By Lookout
We're all very accustomed to sharing Office 365 or Google Workspace content with each other. Watch Aaron Cockerill and Mike Banic of Lookout discuss why this makes us more vulnerable to phishing.
Jan 5, 2021   |  By Lookout
Aaron Cockerill and Mike Banic of Lookout talks about how Lookout overcomes mobile-specific challenges to provide a comprehensive anti-phishing solution.
Jan 5, 2021   |  By Lookout
With a smaller screen, developers are forced to create simplified interfaces on your tablets and smartphones. But this also makes it easy for scammers to hide telltale signs of a phishing link. Aaron Cockerill and Mike Banic of Lookout talks about why we're more vulnerable to phishing when using a mobile device.
Jan 5, 2021   |  By Lookout
On Feb. 14, 2020, Lookout Phishing AI discovered a phishing campaign targeting customers via SMS messaging to lure them to fake websites of well-known Canadian and American banks.
Jan 5, 2021   |  By Lookout
Aaron Cockerill and Mike Banic discusses why mobile device management (MDM) isn't enough to secure your mobile devices.
Dec 18, 2020   |  By Lookout
Threat researchers Apurva Kumar and Justin Albrecht go through the Lookout threat research team’s latest discovery, Goontact. The malware, which we have named Goontact, targets users of illicit sites, typically offering escort services, and steals personal information from their mobile device. You can also follow the team’s work at twitter.com/lookoutthreats
Nov 9, 2020   |  By Lookout
As your manufacturing organization transforms to Industry 4.0, mobile and cloud remain strategic for reinventing your operations. Not surprisingly, malicious actors have taken note of how reliant we all are on mobile devices. From their perspective, mobile phishing is often the cheapest way to compromise an individual or a manufacturing operation.
Nov 9, 2020   |  By Lookout
The perimeter has disappeared. Legacy security technologies do not apply. Devices cannot be trusted. As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Read this whitepaper to.
Nov 1, 2020   |  By Lookout
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile fleet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.
Nov 1, 2020   |  By Lookout
Consumer financial institutions are in the midst of a digital transformation that includes moving traditional face-to-face customer interactions to mobile devices. Forty-three percent of people who own a mobile device and have a bank account use mobile banking, according to a Federal Reserve study titled, "Consumers and Mobile Financial Services." Mobile banking creates unprecedented conveniences for customers, such as mobile check deposits, near-instant person-to-person transfers, and access to personal financial accounts in real time.

Lookout is the leader in mobile security, protecting the device at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where mobile devices are essential to all we do for work and play.

We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Our platform uses artificial intelligence to analyze data from nearly 200 million devices and over 100 million apps to protect you from the full spectrum of mobile risk. As a result, Lookout delivers modern endpoint security with the most comprehensive protection from device, network, app and phishing threats without prying into your data.

Why Lookout for iOS, Android and Chrome OS:

  • Lookout secures our digital future: We protect your smartphone, tablet and Chromebook because they are at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where these devices are essential to all we do for work and play.
  • Protect the personal and professional you: The most common start of a cyberattack is a phishing link and mobile devices have enabled new ways to send them to you. Phishing risks no longer simply hide in email, but in messaging, social media, and even dating apps. Because we use these devices for both, protecting against phishing is critical for our personal and professional lives.
  • An AI-powered security graph for mobile: We protect your data from known and unknown threats without violating your privacy and trust. In the Lookout Security Graph, we use artificial intelligence to analyze telemetry data from nearly 200 million devices and over 120 million apps. The AI of our Security Graph enables us to deliver platform modules that protect you with a lightweight app on your device.
  • A platform to protect, detect and respond: Our Security Platform is built from the ground up to secure mobile devices. We protect mobile fleets of hundreds of thousands of endpoints and stop breaches by rapidly detecting and responding to incidents. From apps with malware to ransomware and phishing scams, you are protected without lifting a finger. When a threat or an attack occurs, we provide step-by-step instructions to investigate what is happening and how to fix it.
  • A lightweight app for 360-degree security: With a lightweight app for your smartphone, tablet or Chromebook, Lookout protects you against the full spectrum of threats. The app stays connected with our platform in the cloud to deliver efficient protection on the device that cannot be subverted and optimizes for processor speed and battery life.

The world's first mobile EDR solution. Delivered on the only platform built for mobile from the ground up.