Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

12/18/2012
10:44 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FCC, Lookout Offer Smartphone Security Checker

Online tool allows people to follow customizable security steps and create an action plan for their devices

San Francisco and Washington, DC – December 18, 2012 – Today Lookout, a global leader in mobile security, and the FCC unveil the Smartphone Security Checker, a checklist to help people keep their mobile devices safe. With nearly half of all Americans now owning smartphones, the FCC and Lookout encourage people to take a few simple steps to protect the sensitive information on them.

Devised in partnership with the U.S. Department of Homeland Security, The Federal Trade Commission, The National Cyber Security Alliance, CTIA-The Wireless Association and Lookout, the online tool covers how to safeguard lost and stolen phones, block digital threats like malware and spyware and prevent financial fraud.

FCC Chairman Julius Genachowski remarked, “With less than half of smartphone owners using passwords to protect their devices, this new tool will be of particular value to millions of Americans. The holiday gift-giving season is a perfect time to remind consumers to take simple steps, like setting a password, to protect themselves from mobile security threats.”

According to data released by Lookout in their 2013 Mobile Threat Predictions, nearly four in 10 people clicked on an unsafe link in 2012. More than 18 million Android users globally are expected to encounter malware over the course of 2012 and 2013, making mobile device protection more important than ever.

Lookout and the FCC recommend the following tips:

Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN). Make sure that every password you use on the Internet (and your mobile browsers) is different from all others.

Do not modify your smartphone’s security settings. Tampering with your phone’s initial security settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service provider, while making it more susceptible to an attack.

Install security apps that enable remote location and wiping. An important security feature widely available on smartphones, either by default or as an app, is the ability to remotely locate and erase all of the data stored on your phone, even if the phone’s GPS is off. In the case that you misplace your phone, some applications can activate a loud alarm, even if your phone is on silent. These apps can also help you locate and recover your phone when lost.

Accept updates and patches to your OS. You should keep your phone’s operating system software up to-date by enabling automatic updates or accepting your service provider’s updates when prompted. By keeping your operating system current, you reduce the risk of exposure to cyber threats.

Only install apps from trusted sources. Before downloading an app, conduct research to ensure the app is legitimate. Many apps from untrusted sources contain malware that once installed, can steal information, install viruses, and cause harm to your phone’s contents. There are also apps that warn you if any security risks exist on your phone.

For the full set of tips for both Android and iOS operating devices, please visit http://www.fcc.gov/smartphone-security.

“We’ve unmistakably transitioned into a mobile era where we rely on our phones and tablets for countless aspects of our everyday lives. A secure mobile experience is a critical factor in determining if people will trust their phones and use them to the fullest potential. It’s great that both the government and private sectors are working together to solve mobile security challenges for the benefit of people everywhere,” says John Hering, CEO and co-founder of Lookout.

Lookout protects people from malware and spyware, backs up personal data, locates lost and stolen phones, and more, in a single app. For more information, visit www.lookout.com or you can download the mobile security app.

About Lookout

Lookout Inc. is a mobile security company dedicated to making the mobile experience safe for everyone. Lookout delivers award-winning protection from the growing threats facing mobile users today, including malware, phishing, privacy violations, data loss, and loss of the phone itself. Cross-platform, Lookout is designed from the ground up to provide advanced mobile protection while remaining lightweight and efficient on the phone. Lookout is the world leader in smartphone security with 30 million users across 400 mobile networks in 170 countries. Headquartered in San Francisco, Lookout is funded by Accel Partners, Andreessen Horowitz, Index Ventures, Iris Capital, Khosla Ventures and Trilogy Equity Partners. Lookout is a 2012 World Economic Forum Technology Pioneer company. For more information and to download Lookout Mobile Security, please visit www.lookout.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15570
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
CVE-2020-15569
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
CVE-2020-7690
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
CVE-2020-7691
PUBLISHED: 2020-07-06
It's possible to use <<script>script> in order to go over the filtering regex.
CVE-2020-15562
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.