Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:26 AM
Dark Reading
Dark Reading
Products and Releases

Lookout Raises $19.5 Million In Series C Round Led By Index Ventures

Company delivers mobile security service to the consumer market

SAN FRANCISCO--December 22, 2010—Lookout Mobile Security, the leader in cloud-based smartphone security, today announced it raised an additional $19.5 million in funding to accelerate the company’s demonstrated success in delivering a mobile security service to the consumer market. Led by new investor, Index Ventures, the round also includes Accel Partners and Khosla Ventures. Mike Volpi, Index partner and former Cisco executive, joins the Lookout board of directors. The company also announced today that it has reached more than four million registered users, a feat accomplished in less than a year.

“Smartphones are the next computer for billions of consumers and it’s clear that, just as in the PC world, consumers and their phones need protection,” said Mike Volpi, Partner, Index Ventures. “Lookout’s unique blend of a qualified executive team, demonstrated success with consumer adoption, and careful balance of ease-of-use and sophisticated security technology, positions the company for success and rapid growth in 2011.”

According to Gartner Research, global smartphone sales grew 96 percent from the third quarter last year, and the application marketplace continues to explode, reaching hundreds of thousands of apps. As phones become more powerful and consumers do more with them, they become more attractive to malicious attacks. In the past several months, incidents of mobile malware have increased. Most recently, a Trojan disguised as a “movie player” application for Android devices was released, which would send premium rate SMS messages and charge money to users’ phone bills without their knowledge. Consumers need protection from threats such as mobile viruses and malware, data loss and theft of the phone itself. Recently selected as a top technology product of 2010 by PC World, Lookout is designed for mobile phones from the ground up, providing comprehensive protection against mobile threats and unparalleled ease of use.

“2010 was a year of tremendous growth for Lookout. We skyrocketed to four million users, launched a successful premium service and gained industry and consumer accolades,” said John Hering, CEO and founder, Lookout Mobile Security. “Moving into 2011 mobile security will be critical. The solution needs to be complete and address the growing needs of smartphone users for protection. This investment will help Lookout expand to other platforms and develop additional security services to protect consumers.”

Lookout is dedicated to protecting users around the world. Available now on more than 400 mobile networks in 170 countries, Lookout protects millions of phones everyday. Lookout offers a free and premium service.

For more information on Lookout, visit www.mylookout.com.

About Lookout Mobile Security

Lookout is a smartphone security company dedicated to making the mobile experience safe for everyone. Lookout delivers protection from malware and spyware, data backup and recovery, and can locate a missing device if it is lost or stolen. Lookout’s unique cross-platform, cloud-connected application is designed from the ground up to provide advanced protection for smartphones while remaining lightweight and efficient on the phone. With users across 400 mobile networks in 170 countries, Lookout is a world leader in smartphone security. Lookout’s award-winning mobile application is available for Android, BlackBerry and Windows Mobile devices. Headquartered in San Francisco, Lookout is funded by Accel Partners, Index Ventures, Khosla Ventures and Trilogy Equity Partners. For more information and to download the application, please visit www.mylookout.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.