
Enterprise mobile phishing increased by 37% in Q1 2020
There was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020, according to Lookout. …

Orgs that sacrifice mobile security are twice as likely to suffer a compromise
The percentage of companies admitting to suffering a mobile-related compromise has grown (39%, when compared to last years’ 33%) despite a higher percentage of …

Crooks are exploiting unpatched Android flaw to drain users’ bank accounts
Hackers are actively exploiting StrandHogg, a newly revealed Android vulnerability, to steal users’ mobile banking credentials and empty their accounts, a Norwegian app …

Mobile security firms will help protect Google Play
Google has partnered with mobile security companies ESET, Lookout and Zimperium to identify potentially harmful and unwanted apps before they are listed on Google Play. …
Lookout now secures BYOD for Microsoft Office 365 users
Lookout, the leader in securing the post-perimeter world, has announced a new, strategic integration to secure bring-your-own-devices (BYOD) for Microsoft Office 365 users. …

Phishers have been targeting UN, UNICEF, Red Cross officials for months – and still do
Researchers have brought to light a longstanding phishing campaign aimed at the UN and its various networks, and a variety of humanitarian organizations, NGOs, universities …

Growing mobile cybersecurity incidents spur plans for increased security investment
A majority of RSA attendees plan to spend more on mobile security in the coming year, Lookout has discovered. Since critical data has moved to the cloud, employees are able to …

Lookout forms alliance to deliver pre-integrated post-perimeter solutions
Lookout, the leader in securing the post-perimeter world, announced the launch of the Post-Perimeter Security Alliance to address a pressing challenge for enterprises: how to …
Lookout puts the trust in zero trust with new post-perimeter security solutions
Lookout’s new approach to cybersecurity is designed to protect businesses as their employees work from outside the corporate perimeter. With integrations to Okta, VMware …
SentinelOne partners with Lookout to extend endpoint protection to mobile devices
SentinelOne has partnered with Lookout to integrate mobile threat data into the SentinelOne console to protect mobile endpoints from attacks. Attackers are redirecting …

New targeted surveillance spyware found on Google Play
A new targeted surveillance app has been found and booted from Google Play. The app, named Dardesh, posed as a chat application and acted as a downloader for a second app that …

Major uptick in mobile phishing URL click rate
In a study of Lookout users, more than half clicked mobile phishing URLs that bypassed existing security controls. Since 2011, Lookout has observed this mobile phishing URL …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility