Welcome!

News Feed Item

Lookout Raises the Bar on Adware Classification

Lookout, the leader in security technology that protects people and businesses from mobile threats, today announced its standard for classifying adware. Adware is an ad network that exhibits intrusive behavior without gaining appropriate consent from a user, which can pose a privacy risk. Additionally, Lookout now flags ad networks newly classified as adware in Lookout Mobile Security for Android, providing users with new insight and information on how to remove any applications containing adware.

Mobile privacy is an increasingly important topic for consumers and app developers, and adware is a risk to user privacy and one of the most prevalent threats on mobile worldwide. Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, and approximately 6.5% of free apps on Google Play today contain adware. In the past year, Lookout estimates that more than one million US Android users downloaded adware.

Ad networks are a vital element in the mobile ecosystem, allowing app developers a way to offer free applications to consumers. Ad networks that overstep user privacy bounds or negatively affect user experience create conflict, compromising not only consumers’ privacy and user experience, but also the developer community that relies on mobile ad networks to bring free products to market.

To date, there has not been a widely-adopted set of guidelines that define what constitutes adware by the broader mobile industry. Lookout defines adware as an ad network that exhibits one or more of the following intrusive behaviors without requesting appropriate user consent: display advertising outside of the normal app experience, harvest unusual personally identifiable information, or perform unexpected actions as a response to ad clicks. Appropriate user consent entails providing a clear alert in the application that allows the user to accept or decline before any of the above behaviors takes place.

Lookout has demonstrated an ongoing commitment in guiding the industry to safer mobile advertising practices. In July 2012, Lookout released Mobile App Advertising Guidelines, a playbook aimed to curb aggressive ad network behavior and encourage the mobile advertising and developer communities to adopt practices that prioritize transparency and user privacy.

The Lookout app for Android now flags ad networks that Lookout classifies as adware, so Lookout users have the ability to make more informed decisions about the apps they have on their device. Download the Lookout app for Android from Google Play.

Adware Data:

  • Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, which is relatively higher than other mobile threats.
  • In the US, a new Lookout user has a 0.9% likelihood of having adware on their device, as recently released in Lookout’s Mobile Threats Around the World report.
  • In the past year, Lookout estimates that more than one million U.S. Android users downloaded adware.
  • Today, approximately 6.5% of free apps on Google Play contain adware, but the prevalence of adware in third-party app stores is significantly higher.
  • Lookout found adware is most prevalent in personalization (26%), racing (23%) and sports games (18%) applications categories.

How to Stay Safe:

  • When downloading apps, make sure you are aware of and comfortable with the application’s permissions before giving consent.
  • Only download apps from official app stores, such as Google Play or the App Store.
  • Use a security app, like Lookout, that will inform you if adware is detected on your device.

Tips for Developers:

  • Provide transparency and context to users about the data an application is accessing or collecting.
  • Pick a responsible ad network by carefully researching the ad network’s user experience and privacy policy.
  • Handle device and identifying user data responsibly (data should always be transmitted and stored using strong encryption).

About Lookout

Lookout builds security software that protects people, businesses and networks from mobile threats. Leveraging a network of more than 40 million devices worldwide, Lookout proactively prevents fraud, protects data and defends privacy to make the world safer as more people and devices become connected. Lookout Mobile Security, the flagship consumer product is available on Android, iOS and Kindle. Lookout was selected as a 2013 World Economic Forum Technology Pioneer company and received the 2013 Laptop Editor’s Choice Award. Lookout has offices in San Francisco and London, and is funded by Accel Partners, Andreessen Horowitz, Index Ventures, Khosla Ventures and Trilogy Equity Partners. For more information, please visit www.lookout.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, will provide a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to ...
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
SYS-CON Events announced today that GrapeUp, the leading provider of rapid product development at the speed of business, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market acr...
Existing Big Data solutions are mainly focused on the discovery and analysis of data. The solutions are scalable and highly available but tedious when swapping in and swapping out occurs in disarray and thrashing takes place. The resolution for thrashing through machine learning algorithms and support nomenclature is through simple techniques. Organizations that have been collecting large customer data are increasingly seeing the need to use the data for swapping in and out and thrashing occurs ...