Mike Murray, Chief Security Officer, Lookout

Ahead of the 2018 midterm elections, we saw a record number of campaigns use mobile devices as an easy way to reach voters. In fact, NBC reporter, David Ingram reported earlier this year that,

“Political campaigns and parties say they’re sending many more texts this year than in past elections as they search for alternatives to social media. Those efforts have been boosted by newly popular software that allows volunteers to send thousands of texts an hour without violating federal rules about bulk texting.”

While many see this as a very efficient way to…

Vijaya Kaza, Chief Development Officer, Lookout

Did you remember to include mobile device security in your budget? If your company is like the majority of organizations in the world, the priority of your security budget is securing your company’s network, data centers, email and endpoint devices such as laptops and desktops. Too often, cyber security plans overlook a significant risk that arises from the organization’s new cyber-attack surfaces: mobile devices and tablets.

Mobile devices are rapidly becoming primary enterprise computing devices for employees. In fact, more than half of internet traffic originates on mobile devices. Users likely have access to…

Aaron Cockerill, Chief Strategy Officer, Lookout

The dawn of the European Union General Data Protection Regulation (GDPR) is upon us, but organizations are overlooking the risk of mobile devices. The cost for non-compliance is steep. For example, if the Equifax breach occurred under GDPR, it is estimated that its fine would have been more than $120 million.

It is no wonder that 77 percent of organizations surveyed by PwC planned to spend $1 million or more on GDPR compliance. …

No longer are emails the only point of attack in mobile phishing attempts.

Aaron Cockerill, Chief Strategy Officer, Lookout

A clever SMS phishing attempt has been making the rounds on Twitter. In this real-life scenario, the attacker sends a text message asking a user if they requested a Google password reset for their Gmail, and to reply with “STOP” if they did not. Once the user replies with “STOP,” the attacker sends another message,

“Confirm the 6 digit numerical code to STOP the password reset. Respond with ‘822’ to have the verification code re-sent”

Google uses this form of two-factor…

Lookout Mobile Security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store