Welcome!

News Feed Item

Lookout Raises the Bar on Adware Classification

Lookout, the leader in security technology that protects people and businesses from mobile threats, today announced its standard for classifying adware. Adware is an ad network that exhibits intrusive behavior without gaining appropriate consent from a user, which can pose a privacy risk. Additionally, Lookout now flags ad networks newly classified as adware in Lookout Mobile Security for Android, providing users with new insight and information on how to remove any applications containing adware.

Mobile privacy is an increasingly important topic for consumers and app developers, and adware is a risk to user privacy and one of the most prevalent threats on mobile worldwide. Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, and approximately 6.5% of free apps on Google Play today contain adware. In the past year, Lookout estimates that more than one million US Android users downloaded adware.

Ad networks are a vital element in the mobile ecosystem, allowing app developers a way to offer free applications to consumers. Ad networks that overstep user privacy bounds or negatively affect user experience create conflict, compromising not only consumers’ privacy and user experience, but also the developer community that relies on mobile ad networks to bring free products to market.

To date, there has not been a widely-adopted set of guidelines that define what constitutes adware by the broader mobile industry. Lookout defines adware as an ad network that exhibits one or more of the following intrusive behaviors without requesting appropriate user consent: display advertising outside of the normal app experience, harvest unusual personally identifiable information, or perform unexpected actions as a response to ad clicks. Appropriate user consent entails providing a clear alert in the application that allows the user to accept or decline before any of the above behaviors takes place.

Lookout has demonstrated an ongoing commitment in guiding the industry to safer mobile advertising practices. In July 2012, Lookout released Mobile App Advertising Guidelines, a playbook aimed to curb aggressive ad network behavior and encourage the mobile advertising and developer communities to adopt practices that prioritize transparency and user privacy.

The Lookout app for Android now flags ad networks that Lookout classifies as adware, so Lookout users have the ability to make more informed decisions about the apps they have on their device. Download the Lookout app for Android from Google Play.

Adware Data:

  • Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, which is relatively higher than other mobile threats.
  • In the US, a new Lookout user has a 0.9% likelihood of having adware on their device, as recently released in Lookout’s Mobile Threats Around the World report.
  • In the past year, Lookout estimates that more than one million U.S. Android users downloaded adware.
  • Today, approximately 6.5% of free apps on Google Play contain adware, but the prevalence of adware in third-party app stores is significantly higher.
  • Lookout found adware is most prevalent in personalization (26%), racing (23%) and sports games (18%) applications categories.

How to Stay Safe:

  • When downloading apps, make sure you are aware of and comfortable with the application’s permissions before giving consent.
  • Only download apps from official app stores, such as Google Play or the App Store.
  • Use a security app, like Lookout, that will inform you if adware is detected on your device.

Tips for Developers:

  • Provide transparency and context to users about the data an application is accessing or collecting.
  • Pick a responsible ad network by carefully researching the ad network’s user experience and privacy policy.
  • Handle device and identifying user data responsibly (data should always be transmitted and stored using strong encryption).

About Lookout

Lookout builds security software that protects people, businesses and networks from mobile threats. Leveraging a network of more than 40 million devices worldwide, Lookout proactively prevents fraud, protects data and defends privacy to make the world safer as more people and devices become connected. Lookout Mobile Security, the flagship consumer product is available on Android, iOS and Kindle. Lookout was selected as a 2013 World Economic Forum Technology Pioneer company and received the 2013 Laptop Editor’s Choice Award. Lookout has offices in San Francisco and London, and is funded by Accel Partners, Andreessen Horowitz, Index Ventures, Khosla Ventures and Trilogy Equity Partners. For more information, please visit www.lookout.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, will explore the value of Kibana 4 for log analysis and will give a real live, hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He will examine three use cases: IT operations, business intelligence, and security and compliance. This is a hands-on session that will require participants to bring their own laptops, and we will provide the rest.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...