Welcome!

News Feed Item

Lookout Raises the Bar on Adware Classification

Lookout, the leader in security technology that protects people and businesses from mobile threats, today announced its standard for classifying adware. Adware is an ad network that exhibits intrusive behavior without gaining appropriate consent from a user, which can pose a privacy risk. Additionally, Lookout now flags ad networks newly classified as adware in Lookout Mobile Security for Android, providing users with new insight and information on how to remove any applications containing adware.

Mobile privacy is an increasingly important topic for consumers and app developers, and adware is a risk to user privacy and one of the most prevalent threats on mobile worldwide. Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, and approximately 6.5% of free apps on Google Play today contain adware. In the past year, Lookout estimates that more than one million US Android users downloaded adware.

Ad networks are a vital element in the mobile ecosystem, allowing app developers a way to offer free applications to consumers. Ad networks that overstep user privacy bounds or negatively affect user experience create conflict, compromising not only consumers’ privacy and user experience, but also the developer community that relies on mobile ad networks to bring free products to market.

To date, there has not been a widely-adopted set of guidelines that define what constitutes adware by the broader mobile industry. Lookout defines adware as an ad network that exhibits one or more of the following intrusive behaviors without requesting appropriate user consent: display advertising outside of the normal app experience, harvest unusual personally identifiable information, or perform unexpected actions as a response to ad clicks. Appropriate user consent entails providing a clear alert in the application that allows the user to accept or decline before any of the above behaviors takes place.

Lookout has demonstrated an ongoing commitment in guiding the industry to safer mobile advertising practices. In July 2012, Lookout released Mobile App Advertising Guidelines, a playbook aimed to curb aggressive ad network behavior and encourage the mobile advertising and developer communities to adopt practices that prioritize transparency and user privacy.

The Lookout app for Android now flags ad networks that Lookout classifies as adware, so Lookout users have the ability to make more informed decisions about the apps they have on their device. Download the Lookout app for Android from Google Play.

Adware Data:

  • Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, which is relatively higher than other mobile threats.
  • In the US, a new Lookout user has a 0.9% likelihood of having adware on their device, as recently released in Lookout’s Mobile Threats Around the World report.
  • In the past year, Lookout estimates that more than one million U.S. Android users downloaded adware.
  • Today, approximately 6.5% of free apps on Google Play contain adware, but the prevalence of adware in third-party app stores is significantly higher.
  • Lookout found adware is most prevalent in personalization (26%), racing (23%) and sports games (18%) applications categories.

How to Stay Safe:

  • When downloading apps, make sure you are aware of and comfortable with the application’s permissions before giving consent.
  • Only download apps from official app stores, such as Google Play or the App Store.
  • Use a security app, like Lookout, that will inform you if adware is detected on your device.

Tips for Developers:

  • Provide transparency and context to users about the data an application is accessing or collecting.
  • Pick a responsible ad network by carefully researching the ad network’s user experience and privacy policy.
  • Handle device and identifying user data responsibly (data should always be transmitted and stored using strong encryption).

About Lookout

Lookout builds security software that protects people, businesses and networks from mobile threats. Leveraging a network of more than 40 million devices worldwide, Lookout proactively prevents fraud, protects data and defends privacy to make the world safer as more people and devices become connected. Lookout Mobile Security, the flagship consumer product is available on Android, iOS and Kindle. Lookout was selected as a 2013 World Economic Forum Technology Pioneer company and received the 2013 Laptop Editor’s Choice Award. Lookout has offices in San Francisco and London, and is funded by Accel Partners, Andreessen Horowitz, Index Ventures, Khosla Ventures and Trilogy Equity Partners. For more information, please visit www.lookout.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
All zSystem customers have a significant new business opportunity to extend their reach to new customers and markets with new applications and services, and to improve the experience of existing customers. This can be achieved by exposing existing z assets (which have been developed over time) as APIs for accessing Systems of Record, while leveraging mobile and cloud capabilities with new Systems of Engagement applications. In this session, we will explore business drivers with new Node.js apps ...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
The technologies behind big data and cloud computing are converging quickly, offering businesses new capabilities for fast, easy, wide-ranging access to data. However, to capitalize on the cost-efficiencies and time-to-value opportunities of analytics in the cloud, big data and cloud technologies must be integrated and managed properly. Pythian's Director of Big Data and Data Science, Danil Zburivsky will explore: The main technology components and best practices being deployed to take advantage...
For years the world's most security-focused and distributed organizations - banks, military/defense agencies, global enterprises - have sought to adopt cloud technologies that can reduce costs, future-proof against data growth, and improve user productivity. The challenges of cloud transformation for these kinds of secure organizations have centered around data security, migration from legacy systems, and performance. In our presentation, we will discuss the notion that cloud computing, properl...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Digital Transformation is well underway with many applications already on the cloud utilizing agile and devops methodologies. Unfortunately, application security has been an afterthought and data breaches have become a daily occurrence. Security is not one individual or one's team responsibility. Raphael Reich will introduce you to DevSecOps concepts and outline how to seamlessly interweave security principles across your software development lifecycle and application lifecycle management. With ...
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
Dhiraj Sehgal works in Delphix's product and solution organization. His focus has been DevOps, DataOps, private cloud and datacenters customers, technologies and products. He has wealth of experience in cloud focused and virtualized technologies ranging from compute, networking to storage. He has spoken at Cloud Expo for last 3 years now in New York and Santa Clara.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...