Risk
11/2/2010
01:25 PM
50%
50%

Lookout Rolls Android Privacy App

Tool scans smartphone apps and reveals which are accessing private identity, location, and information.

Top 20 Android Productivity Apps
(click image for larger view)
Slideshow: Top 20 Android Productivity Apps

Lookout Mobile Security on Tuesday unveiled its Lookout Premium for Android for enhanced smartphone protection. The cloud-based Lookout Premium's new Privacy Advisor feature gives users visibility into and control of their personal information when they access smartphone apps.

Privacy Advisor will let users scan every app they download and discover which can access their private data, including identity information, location, and messages. Detailed reports on the apps' capabilities on their phones are also available for users to view, Lookout said. The smartphone security provider said it has gained more than three million users in less than a year.

"Lookout Premium provides smartphone owners the peace of mind to explore everything that the new mobile world offers safely by providing added security, data protection, and visibility into personal information being accessed by the apps on their phones," said John Hering, CEO and founder of Lookout Mobile Security, in a statement.

Security and data privacy concerns are increasing with the rapid adoption of smartphones and the amount of data and proprietary information users have on their devices. On average, users have 31 apps on their phones that can access their identity information, according to Lookout, along with 19 apps that access their location, and five apps that access their SMS and MMS messages.

More than 91% of consumers have some level of concern about the privacy of information on their phone and only 7% said they feel very confident they understand what private information is being accessed on their phone, according to a recent study, Lookout said.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.