Welcome!

News Feed Item

68 Percent of Smartphone Theft Victims Willing to Put Themselves in Danger to Retrieve Stolen Phone

Lookout, the leader in mobile security, today released Phone Theft in America, a new report based on research from more than 2,000 smartphone theft victims in the United States, United Kingdom, France and Germany. Among the U.S. findings, 68 percent of American smartphone theft victims are likely to put their personal safety at risk if it might lead to recovering their photos, videos, music, and other personal data. The research also found that half of victims are somewhat to extremely likely to pay $500 just to retrieve the personal data on their stolen phone – a third say they would pay $1,000 for this.

“The reality is that 1 in 10 U.S. smartphone owners are victims of phone theft and 68 percent of those victims are unable to ever recover their device after the theft occurred. This is an issue that is bound to keep growing,” said Kevin Mahaffey, co-founder and CTO of Lookout. “While there isn’t one single solution that is going to alleviate phone theft, the problem can be stifled with industry collaboration, technology, and widespread awareness for how to stay safe.”

There were a few surprising findings in Lookout’s research:

  • A significant number of smartphone theft victims said their device disappeared in the middle of the day, not late at night – 40 percent of victims said their smartphone was stolen between lunch time and the end of the work day (between 12 p.m. and 5 p.m.), compared to 18 percent of victims whose phones were stolen between 10 p.m. and 5 a.m.
  • Forty-four percent of thefts happen because the victim left their phone on a table or bar or walked away from it in some capacity. Fourteen percent were stolen from a car or house that was burglarized, while 11 percent of phones were stolen off the victim’s person: out of their hands, pockets, purses, or bags.

The research also revealed that the top places to have a phone stolen are:

  • In a restaurant (16 percent)
  • At a bar or nightclub (11 percent)
  • At work (11 percent)
  • On public transportation (6 percent)
  • On the street (5 percent)

The most severe consequences of phone theft include fraudulent charges (12 percent) and even identity theft (9 percent). As a result, about 90 percent of smartphone theft victims said they tried to get their phone back, including 60 percent who said they filed a police report. But 10 percent of these theft victims made no effort at all to recover their phone, primarily because they just didn’t know where to start.

To learn more, visit Lookout’s complete Phone Theft in America Report, which includes consumer tips on how to best handle a theft scenario. For more information on Lookout, please visit www.lookout.com. To download Lookout’s app, visit the Google Play or App Store.

Research Methodology

The survey was conducted online by IDG Research on behalf of Lookout between March 4 and March 20, 2014. The survey was fielded to respondents in the U.S., U.K., France, and Germany who reported owning a smartphone. Quotas were set to ensure that approximately 500 respondents (2,403 complete responses) from each country had their smartphones stolen at some point, while another 100 respondents from each country were allowed to complete the survey despite never having their smartphone stolen.

About Lookout

Lookout secures the new generation of mobile computing for individuals and organizations everywhere. With a global network of tens of millions of devices and the world’s most comprehensive mobile data set, Lookout provides powerful threat protection that makes the world more secure as it becomes more connected. Lookout's cloud-based platform leverages predictive analytics and machine learning to provide unparalleled insight into malicious and anomalous behaviors, application usage and network dynamics. These insights enable Lookout to counter threats, often before they put data, devices and networks at risk. With partners and customers worldwide, Lookout has offices in San Francisco, London and Tokyo. For more information, please visit www.lookout.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Infoblox does DNS, DHCP and IP address management for not only enterprise networks but cloud networks as well. Customers are looking for a single platform that can extend not only in their private enterprise environment but private cloud, public cloud, tracking all the IP space and everything that is going on in that environment," explained Steve Salo, Principal Systems Engineer at Infoblox, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventio...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to oper...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced you to the challenges, solutions and benefits of training AI systems to solve visual problems with an emphasis on improving AIs with continuous training in the field. He explored applications in several industries and discussed technologies that allow the deployment of advanced visualization solutions to the cloud.
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
"ZeroStack is a startup in Silicon Valley. We're solving a very interesting problem around bringing public cloud convenience with private cloud control for enterprises and mid-size companies," explained Kamesh Pemmaraju, VP of Product Management at ZeroStack, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.