Lookout Plans to Take Android Security to the Next Level - gHacks Tech News

Lookout Plans to Take Android Security to the Next Level

Mobile security has become a necessary evil in today's world, with malware and hacks for both Android and iPhone devices finding their way into our mobile lives, most recently with a high-profile, but low impact, dialer exploit for the popular Samsung Galaxy S3 phones.  Samsung has patched the vulnerability, which allowed malware to access the phone's dialer and perform a remote data wipe.  Those using mobile security service Lookout were protected from the problem.  Apparently Lookout has more goodies in store next week, as they hinted at in a recent email teaser.

Lookout, if you aren't familiar with it, provides a lot of security features for the Android platform.  Not only does it serve as an anti-virus program blocking malware, spyware and trojans, but it also scans each app you download, allows you to schedule virus scans, monitors your file system, including SD cards, provides a "find my phone" service and even backs up your contacts.

An email sent out by the company to it's users teased something big coming to the service next week.  The announcement was extremely vague, stating only a brief hint - "Only 7 more days.  GET FIRED UP!  We’re taking mobile security to the next level. Stay tuned!"

lookout announcement

The app already covers a large portion of what any user would want in security for their mobile device, so it's hard to imagine where they may be going with this.  There are a couple of directions that come to mind such as blocking potentially malicious web sites in your mobile browser or scanning shortened URL's received in email and text messages.  I'm not sure if either of those warrent being called "a whole new level" though.

The email, which went out yesterday, states "7 more days", so apparently we will be finding out what all of this is about next Wednesday.  In the meantime, no more hints seem to be coming so it's all pure speculation.

We need your help

Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.

We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.

If you like our content, and would like to help, please consider making a contribution:

Comments

  1. ilev said on October 4, 2012 at 8:28 pm
    Reply

    “dialer exploit for the popular Samsung Galaxy S3 phones”…

    Correction, all Android smartphones , not just Samsung Galaxy S3 are still vulnerable
    to this hack which will never be fixed by manufacturers or carriers.


    Yesterday we reported about a flaw in Samsung’s
    Touchwiz UI that allowed for data wiping, among
    other nasties. The good news is that the flaw has
    already been patched. The bad news is that self-
    described general geek Dylan Reeve says it’s not
    just limited to Samsung devices.

    Reeve explains how the remote Unstructured
    Supplementary Service Data (USSD) vulnerability
    affects many phones, and he has personally verified
    it on an HTC One X (running HTC Sense 4.0 on
    Android 4.0.3) and a Motorola Defy (running
    Cyanogen Mod 7 on Android 2.3.5). Reports suggest
    the Sony Xperia Active and the Sony Xperia Arc S
    are also affected, our very own Nick Summers
    confirms his HTC Desire running Android 2.2 is
    vulnerable, and the list likely doesn’t stop
    there…

    http://thenextweb.com/google/2012/09/26/heres-check-android-device-vulnerable-remotely-wiped-hackers/

    1. ilev said on October 4, 2012 at 9:38 pm
      Reply

      p.s and don’t forget the PlaceRaider :

      PlaceRaider exploits innate weaknesses in Android
      to use the phone’s camera to surreptitiously take
      photographs, and send that data off to a command
      and control server where an attacker could build a
      3D model of the victim’s environment.

      “Remote burglars can thus download the physical
      space, study the environment carefully and steal
      virtual objects from the environment such as as
      financial documents, information on computer
      monitors and personally identifiable information,” …

      http://arxiv.org/pdf/1209.5982v1.pdf

  2. DanTe said on October 4, 2012 at 10:43 pm
    Reply

    So how is Lookout? I have been using McAfee’s WaveSecure. Mostly because I know McAfee, and I’m not sure what kind of privacy policy Lookout actually follows. Anyone had experience? and tested it?

  3. ilev said on October 5, 2012 at 1:04 pm
    Reply

    Be aware that Lookout Mobile Security has administrator privileges to the Android
    system, and takes total control of your device. It can log behind users back to
    their bank accounts performing transactions like money transfers…..
    The bank that I work with and that gives employees iPhones and Android phones,
    has blocked the use of Lookout due to these security reasons…

  4. ANatoly Nechaev said on October 6, 2012 at 1:36 am
    Reply

    Lookout is regularly uses FUD in their marketing.
    In fact they’ve started from it. Remember they accused inocent chineese wallpaper app of stealing your private information?
    It was them who didn’t understand how android device identification works.

    Why whould anybody would use a product like that?

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

Please note that your comment may not appear immediately after you post it.