|By Business Wire||
|May 7, 2014 10:02 AM EDT||
Lookout, the leader in mobile security, today released Phone Theft in America, a new report based on research from more than 2,000 smartphone theft victims in the United States, United Kingdom, France and Germany. Among the U.S. findings, 68 percent of American smartphone theft victims are likely to put their personal safety at risk if it might lead to recovering their photos, videos, music, and other personal data. The research also found that half of victims are somewhat to extremely likely to pay $500 just to retrieve the personal data on their stolen phone – a third say they would pay $1,000 for this.
“The reality is that 1 in 10 U.S. smartphone owners are victims of phone theft and 68 percent of those victims are unable to ever recover their device after the theft occurred. This is an issue that is bound to keep growing,” said Kevin Mahaffey, co-founder and CTO of Lookout. “While there isn’t one single solution that is going to alleviate phone theft, the problem can be stifled with industry collaboration, technology, and widespread awareness for how to stay safe.”
There were a few surprising findings in Lookout’s research:
- A significant number of smartphone theft victims said their device disappeared in the middle of the day, not late at night – 40 percent of victims said their smartphone was stolen between lunch time and the end of the work day (between 12 p.m. and 5 p.m.), compared to 18 percent of victims whose phones were stolen between 10 p.m. and 5 a.m.
- Forty-four percent of thefts happen because the victim left their phone on a table or bar or walked away from it in some capacity. Fourteen percent were stolen from a car or house that was burglarized, while 11 percent of phones were stolen off the victim’s person: out of their hands, pockets, purses, or bags.
The research also revealed that the top places to have a phone stolen are:
- In a restaurant (16 percent)
- At a bar or nightclub (11 percent)
- At work (11 percent)
- On public transportation (6 percent)
- On the street (5 percent)
The most severe consequences of phone theft include fraudulent charges (12 percent) and even identity theft (9 percent). As a result, about 90 percent of smartphone theft victims said they tried to get their phone back, including 60 percent who said they filed a police report. But 10 percent of these theft victims made no effort at all to recover their phone, primarily because they just didn’t know where to start.
To learn more, visit Lookout’s complete Phone Theft in America Report, which includes consumer tips on how to best handle a theft scenario. For more information on Lookout, please visit www.lookout.com. To download Lookout’s app, visit the Google Play or App Store.
The survey was conducted online by IDG Research on behalf of Lookout between March 4 and March 20, 2014. The survey was fielded to respondents in the U.S., U.K., France, and Germany who reported owning a smartphone. Quotas were set to ensure that approximately 500 respondents (2,403 complete responses) from each country had their smartphones stolen at some point, while another 100 respondents from each country were allowed to complete the survey despite never having their smartphone stolen.
Lookout secures the new generation of mobile computing for individuals and organizations everywhere. With a global network of tens of millions of devices and the world’s most comprehensive mobile data set, Lookout provides powerful threat protection that makes the world more secure as it becomes more connected. Lookout's cloud-based platform leverages predictive analytics and machine learning to provide unparalleled insight into malicious and anomalous behaviors, application usage and network dynamics. These insights enable Lookout to counter threats, often before they put data, devices and networks at risk. With partners and customers worldwide, Lookout has offices in San Francisco, London and Tokyo. For more information, please visit www.lookout.com.
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Jul. 30, 2016 04:30 PM EDT Reads: 541
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Jul. 30, 2016 04:30 PM EDT Reads: 1,104
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 30, 2016 04:30 PM EDT Reads: 2,266
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Jul. 30, 2016 04:15 PM EDT Reads: 605
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Jul. 30, 2016 02:30 PM EDT Reads: 1,054
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Jul. 30, 2016 02:00 PM EDT Reads: 511
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Jul. 30, 2016 01:30 PM EDT Reads: 969
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Jul. 30, 2016 01:00 PM EDT Reads: 1,854
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Jul. 30, 2016 01:00 PM EDT Reads: 2,122
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Jul. 30, 2016 12:00 PM EDT Reads: 1,360
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 30, 2016 11:30 AM EDT Reads: 1,400
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Jul. 30, 2016 11:00 AM EDT Reads: 629
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Jul. 30, 2016 11:00 AM EDT Reads: 544
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Jul. 30, 2016 10:45 AM EDT Reads: 1,110
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Jul. 30, 2016 10:15 AM EDT Reads: 1,048