Risk
11/2/2010
01:25 PM
50%
50%

Lookout Rolls Android Privacy App

Tool scans smartphone apps and reveals which are accessing private identity, location, and information.

Top 20 Android Productivity Apps
(click image for larger view)
Slideshow: Top 20 Android Productivity Apps

Lookout Mobile Security on Tuesday unveiled its Lookout Premium for Android for enhanced smartphone protection. The cloud-based Lookout Premium's new Privacy Advisor feature gives users visibility into and control of their personal information when they access smartphone apps.

Privacy Advisor will let users scan every app they download and discover which can access their private data, including identity information, location, and messages. Detailed reports on the apps' capabilities on their phones are also available for users to view, Lookout said. The smartphone security provider said it has gained more than three million users in less than a year.

"Lookout Premium provides smartphone owners the peace of mind to explore everything that the new mobile world offers safely by providing added security, data protection, and visibility into personal information being accessed by the apps on their phones," said John Hering, CEO and founder of Lookout Mobile Security, in a statement.

Security and data privacy concerns are increasing with the rapid adoption of smartphones and the amount of data and proprietary information users have on their devices. On average, users have 31 apps on their phones that can access their identity information, according to Lookout, along with 19 apps that access their location, and five apps that access their SMS and MMS messages.

More than 91% of consumers have some level of concern about the privacy of information on their phone and only 7% said they feel very confident they understand what private information is being accessed on their phone, according to a recent study, Lookout said.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4467
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site.

CVE-2014-4476
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4477
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4479
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4480
Published: 2015-01-30
Directory traversal vulnerability in afc in AppleFileConduit in Apple iOS before 8.1.3 and Apple TV before 7.0.3 allows attackers to access unintended filesystem locations by creating a symlink.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.