Critical Mobile Phishing Trends

Remote work and BYOD have caused the number of employee phishing victims to rise at an alarming rate.

The Global State of Mobile Phishing Report

Mobile phishing attacks are the tip of the spear for more advanced campaigns that pose serious risk to your data.

Energy Industry Threat Report

The energy industry is a prime target for attacks as mobile threats like phishing and app encounter rate is higher than other industries. Discover what these threats mean.

A Day in the Life of Manufacturing IP

5 security gaps driven by digital transformation

U.S. Federal Mobile Threats

Lookout analyzed its mobile security data to provide a view into the current mobile security risks facing US Federal government mobile users.

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Lookout data reveals that U.S. government organizations are increasingly targeted by credential stealing mobile attacks and exposed to hundreds of vulnerabilities.

The Pharmaceutical Threat Report

Access the Pharmaceutical Threat Report to better understand the risks mobile devices have introduced into your organization with Lookout today.

How Manufacturers Can Mitigate Mobile Phishing Risks

From the inherent risks of cloud apps to the ongoing need to protect intellectual property and maintain industry compliance. Learn how to protect your manufacturing business.

Cybercriminals Want Your Organization’s Login Credentials

Read why government agencies need protection against endpoint threats.cDownload the infographic now to get the stats

Your App Is Your Business

Embed security into the apps your patients and staff use to protect your practice.

How We Empower Your Attorneys to Securely Telecommute

Lookout protects your legal practice against mobile and phishing attacks.

Don’t Let Mobile Devices Tip the Scales

To better secure your firm, understand the threats mobile devices introduce.

How We Protect Law Firms From Phishing

Lookout phishing secures your attorneys from phishing without violating their privacy.

Cybercriminals Want Secret Pharma Recipes

Learn how to mitigate risks of a data breach across your supply chain.

Federal Systems Integrator Secures Against Mobile Phishing

“Lookout enables people to work the way they want on their phones,” says security architect.

Lookout Phishing and Content Protection

Phishing is the primary tool used by attackers to gain access to your organization’s network. Learn more about Lookout Phishing and Content Protection.

Lookout + Trustonic Partnership Brief

Mobile apps have become a key part of everyday life to manage everything from booking travel to handling finances. This rise has also led to more attacks.

Identifying Phishing Attacks Targeting Verizon Customers

Lookout recently discovered a new phishing attack targeting Verizon customers. The attacker developed a mobile specific site designed to resemble a Verizon app.

Mobile Threats: NotCompatible.C

Mobile device attacks are highlighting security shortcomings and exposing sensitive data and personal information at an alarming rate.

Mobile Phishing: Myths and Facts Facing Every Enterprise

Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device.

Prevent Phishing Campaign Demo Video

Lookout has tracked the evolution of the cybercrime group responsible and the increased technical sophistication of the latest variant, NotCompatible.C.

Post-Perimeter Security for Field Agents

Survey reveals phishing attacks targeting remote government field agents on mobile devices.

The Four Biggest Threats to Financial Services

With mobile as a catalyst for digital transformation in financial services, organizations must secure all users, devices, apps, and data —from endpoints to the cloud.

How Lookout Phishing and Content Protection Works

Phishing is the primary tool used by attackers to gain access to your organization’s network. Lookout data shows that up to 25% of employees are fooled in phishing tests.

Mobile App Threat Killchain

Mobile app threats are prevalent and can be difficult to detect. The most common examples are sideloaded and unsecured apps, but there are many other forms.

Don’t Let Mobile Devices Cause the Next Big Heist

Financial services industry employees and customers rely on mobile devices and threat actors are constantly finding ways to exploit them to access cloud infrastructure.

Mobile Phishing Killchain Infographic

Lookout defends mobile users against phishing, app, device, and network-based attacks. By protecting users, Lookout secures the corporate data accessed from those devices.

Financial Services Mobile Apps Are Under Attack

Phishing is more problematic on mobile

Lookout Mobile Phishing and Content Protection

Find out how PCP protects organizations against phishing attacks and inappropriate content.

Lookout and Microsoft Securing BYOD Together

Together, Microsoft and Lookout provide comprehensive mobile security for Office 365 BYOD users

Phishing AI Actively Detects Early Signals of Phishing Sites

Most cyber attacks targeting the enterprise begin with phishing. To combat this, Lookout developed Phishing AI to identify early signals of attacks and provide early warning.

Nation State Mobile Surveillanceware Using Phishing To Con Victims

Lookout Security Intelligence has discovered a set of custom Android and iOS surveillanceware tools we’re respectively calling Stealth Mango and Tangelo.

Lookout Mobile Phishing Protection: Visibility and Protection Against Sophisticated Mobile Phishing Threats

Phishing is the primary tool used by attackers to gain access to your organization’s network. Lookout data shows that 1 in 50 enterprise users are phished on mobile daily

Lookout and Microsoft Enterprise Mobility + Security

With Lookout and Microsoft Enterprise Mobility + Security (EMS), organizations are able to enable their employees while protecting sensitive data accessed by mobile devices.

Lookout Mobile Endpoint Security Datasheet

See how Lookout protects your organization against mobile threats and data leakage.

BYOD Increases Mobile Phishing Rates, and the Risks Have Never Been Higher

We've just published our Global State of Mobile Phishing report, which explores phishing trends and the risk they present to both your data and your financial bottom line.

BYOD and Phishing Attacks: Top Threats Facing US Government

Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.

Beyond BEC: How Modern Phishing Has Evolved Past Email

Business email compromise (BEC) is big business for malicious actors. According to the 2021 FBI Internet Crime Report, BEC was responsible for $2.4 billion in cyber crimes.

Work and Life Have Intertwined: Why You Need to Protect Against Phishing

Don't bring your personal life into the office; don't bring your work stuff home — these were already difficult tasks prior to the 2020 pandemic.

How to Protect Against SMS Phishing and Other Similar Attacks

Whenever a breach occurs, we always need to think about the lessons that can be learned. Here are my tips for keeping your organization safe from mobile phishing attacks.

When it Comes to Tax Season, There is No Safe Haven From Phishing

Tax-related phishing attacks have become so pervasive that the IRS issued an annual advisory as a warning to businesses and consumers.

Cyber Readiness and the Russia-Ukraine War

The cyber threats initially directed at Ukrainian government bodies and infrastructure could easily be targeted at other nations.

The Olympics and Burner Phones: Are You Sure About the Safety of That QR Code?

While QR codes make navigating activities at the Games easy and contactless, it creates opportunities for them to be abused for phishing purposes.

Financial Sector Phishing Attacks Increase 125%

To better understand how the financial industry reacted to this digital shift, I took a deep dive into the millions of device and threat data in the Lookout Security Graph.

Malware as a Service Meets Mobile Phishing: A Dangerous Combo

This campaign is the latest example of how attacks are leveraging various mobile-targeting methods to maximize their return.

Telkomsel Partnership to Deliver Mobile Device/App Security

We're excited that Telkomsel has partnered with Lookout to launch Telkomsel Mobile Endpoint Protection (MEP) and Telkomsel Mobile App Protection (MAP).

The Zero Trust Lesson Behind Mobile Phishing Against Australian Officials

Australia recently confirmed that a series of mobile phishing attacks were successfully executed on senior officials. Discover more at Lookout today.

Pharma on the Hook: Cyberattackers Phishing for Your Secret Formulas

We found that 77 percent of mobile phishing attempts on pharmaceutical organizations through the third quarter of 2020 intended on delivering malware.

FBI Cries Foul on Rise in “Vishing” Volume

On August 20, the Federal Bureau of Investigation (FBI) issued a warning about the rise in vishing attacks.

Mobile Phishing Is Spiking Around the World

Here at Lookout, we often work with organizations on their cybersecurity needs depending on geographical or industry sector priorities.

Global Mobile Phishing Encounters Surged by 37% Amid Shift To Work-From-Home

Mobile Phishing Spotlight Report - Lookout revealed that enterprise mobile phishing encounter rates surged 37% between the last quarter of 2019 and the first quarter of 2020.

Achieving Unified Endpoint Security: Lookout and VMware Carbon Black

With this UES solution, security teams can use a centralized dashboard to monitor the security of all endpoints accessing resources – both mobile and fixed endpoints.

Protecting Government Agencies From Phishing Attacks

Lookout Phishing & Content Protection is designed to keep the public sector secure from phishing attacks in a mobile-first world. Learn more today.

Protecting the Financial Services Industry From Phishing Attacks

Lookout Phishing and Content Protection is designed to keep financial services secure from phishing attacks in the mobile-first, cloud-first and perimeter-less world.

Protecting the Healthcare Industry From Phishing Attacks

Lookout Phishing & Content Protection is designed to keep healthcare organizations secure from phishing attacks in a mobile-first world. Learn more today.

5 Steps in the Mobile Phishing Kill Chain

In order for enterprises to protect their users and corporate data from modern phishing attacks, they must first understand how mobile phishing attacks work.

Mobile Phishing Protection: How To Defend Against HTTPS Phishing Attacks

With Lookout deployed, enterprises have comprehensive mobile phishing protection, ensuring that their corporate data is secure in today’s mobile-first world.

Texts and Their Impact on Election Campaign Security

Lookout recognized that mobile devices could influence the elections, so that is why we held a special briefing on Capitol Hill in early October.

Mobile Phishing: The Biggest Unsolved Problem in Cybersecurity

Mobile phishing brings together new channels for phishing employees and reduced screen size, causing one of the biggest problems businesses have faced in cybersecurity yet.

The State of Mobile Phishing in 2023: Why It’s Here To Stay

Discover the key strategies to protect your data from mobile phishing attacks, as attackers capitalize on BYOD and remote workers.

From the Frontlines – Threats for Your Mobile Fleet

Hear first hand from industry leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile cloud services.

Gone Phishing? How Hackers Use Mobile Devices As Bait

Learn why mobile devices are a key target for threat actors looking to gain access to your key corporate infrastructure.

Trends and Statistics for Mobile Phishing in the Enterprise

Employees working outside of their corporate perimeters, coupled with the shift to cloud-based services, opens a whole new door of vulnerabilities. Namely, phishing threats.

The Latest Guidance To Secure Mobile Devices

NIST has released Special Publication (SP) 800-124: Guidelines for Managing the Security of Mobile Devices in the Enterprise.

How Are Attackers Targeting Mobile Devices?

With employees accessing O365, G Suite, Salesforce, and other services where attackers see an opportunity. Join Lookout and Eurofins to learn from the hacker's perspective.

Phishing Threats in a Mobile-Enabled World

Your employees work differently now and the usage of primarily mobile devices, opens a whole new door of vulnerabilities that organizations need to consider.

The Twilio Breach and Phishing: Lessons Learned

Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus. Tune in for this short episode to learn more about the mechanisms behind the phishing campaign and tips for mitigating this threat.

What is Phishing? 5 Types of Phishing Attacks You Need to Know

To get your attention, phishing attacks use emails designed to look like urgent messages from banks, and credit card companies. Learn more about phishing.