Lookout Plans to Take Android Security to the Next Level

Alan Buckingham
Oct 4, 2012
Updated • Dec 1, 2012
Apps, Google Android

Mobile security has become a necessary evil in today's world, with malware and hacks for both Android and iPhone devices finding their way into our mobile lives, most recently with a high-profile, but low impact, dialer exploit for the popular Samsung Galaxy S3 phones.  Samsung has patched the vulnerability, which allowed malware to access the phone's dialer and perform a remote data wipe.  Those using mobile security service Lookout were protected from the problem.  Apparently Lookout has more goodies in store next week, as they hinted at in a recent email teaser.

Lookout, if you aren't familiar with it, provides a lot of security features for the Android platform.  Not only does it serve as an anti-virus program blocking malware, spyware and trojans, but it also scans each app you download, allows you to schedule virus scans, monitors your file system, including SD cards, provides a "find my phone" service and even backs up your contacts.

An email sent out by the company to it's users teased something big coming to the service next week.  The announcement was extremely vague, stating only a brief hint - "Only 7 more days.  GET FIRED UP!  We’re taking mobile security to the next level. Stay tuned!"

The app already covers a large portion of what any user would want in security for their mobile device, so it's hard to imagine where they may be going with this.  There are a couple of directions that come to mind such as blocking potentially malicious web sites in your mobile browser or scanning shortened URL's received in email and text messages.  I'm not sure if either of those warrent being called "a whole new level" though.

The email, which went out yesterday, states "7 more days", so apparently we will be finding out what all of this is about next Wednesday.  In the meantime, no more hints seem to be coming so it's all pure speculation.


Tutorials & Tips

Previous Post: «
Next Post: «


  1. ANatoly Nechaev said on October 6, 2012 at 1:36 am

    Lookout is regularly uses FUD in their marketing.
    In fact they’ve started from it. Remember they accused inocent chineese wallpaper app of stealing your private information?
    It was them who didn’t understand how android device identification works.

    Why whould anybody would use a product like that?

  2. ilev said on October 5, 2012 at 1:04 pm

    Be aware that Lookout Mobile Security has administrator privileges to the Android
    system, and takes total control of your device. It can log behind users back to
    their bank accounts performing transactions like money transfers…..
    The bank that I work with and that gives employees iPhones and Android phones,
    has blocked the use of Lookout due to these security reasons…

  3. DanTe said on October 4, 2012 at 10:43 pm

    So how is Lookout? I have been using McAfee’s WaveSecure. Mostly because I know McAfee, and I’m not sure what kind of privacy policy Lookout actually follows. Anyone had experience? and tested it?

  4. ilev said on October 4, 2012 at 8:28 pm

    “dialer exploit for the popular Samsung Galaxy S3 phones”…

    Correction, all Android smartphones , not just Samsung Galaxy S3 are still vulnerable
    to this hack which will never be fixed by manufacturers or carriers.

    Yesterday we reported about a flaw in Samsung’s
    Touchwiz UI that allowed for data wiping, among
    other nasties. The good news is that the flaw has
    already been patched. The bad news is that self-
    described general geek Dylan Reeve says it’s not
    just limited to Samsung devices.

    Reeve explains how the remote Unstructured
    Supplementary Service Data (USSD) vulnerability
    affects many phones, and he has personally verified
    it on an HTC One X (running HTC Sense 4.0 on
    Android 4.0.3) and a Motorola Defy (running
    Cyanogen Mod 7 on Android 2.3.5). Reports suggest
    the Sony Xperia Active and the Sony Xperia Arc S
    are also affected, our very own Nick Summers
    confirms his HTC Desire running Android 2.2 is
    vulnerable, and the list likely doesn’t stop


    1. ilev said on October 4, 2012 at 9:38 pm

      p.s and don’t forget the PlaceRaider :

      PlaceRaider exploits innate weaknesses in Android
      to use the phone’s camera to surreptitiously take
      photographs, and send that data off to a command
      and control server where an attacker could build a
      3D model of the victim’s environment.

      “Remote burglars can thus download the physical
      space, study the environment carefully and steal
      virtual objects from the environment such as as
      financial documents, information on computer
      monitors and personally identifiable information,” …


Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.