|By Business Wire||
|May 7, 2014 10:02 AM EDT||
Lookout, the leader in mobile security, today released Phone Theft in America, a new report based on research from more than 2,000 smartphone theft victims in the United States, United Kingdom, France and Germany. Among the U.S. findings, 68 percent of American smartphone theft victims are likely to put their personal safety at risk if it might lead to recovering their photos, videos, music, and other personal data. The research also found that half of victims are somewhat to extremely likely to pay $500 just to retrieve the personal data on their stolen phone – a third say they would pay $1,000 for this.
“The reality is that 1 in 10 U.S. smartphone owners are victims of phone theft and 68 percent of those victims are unable to ever recover their device after the theft occurred. This is an issue that is bound to keep growing,” said Kevin Mahaffey, co-founder and CTO of Lookout. “While there isn’t one single solution that is going to alleviate phone theft, the problem can be stifled with industry collaboration, technology, and widespread awareness for how to stay safe.”
There were a few surprising findings in Lookout’s research:
- A significant number of smartphone theft victims said their device disappeared in the middle of the day, not late at night – 40 percent of victims said their smartphone was stolen between lunch time and the end of the work day (between 12 p.m. and 5 p.m.), compared to 18 percent of victims whose phones were stolen between 10 p.m. and 5 a.m.
- Forty-four percent of thefts happen because the victim left their phone on a table or bar or walked away from it in some capacity. Fourteen percent were stolen from a car or house that was burglarized, while 11 percent of phones were stolen off the victim’s person: out of their hands, pockets, purses, or bags.
The research also revealed that the top places to have a phone stolen are:
- In a restaurant (16 percent)
- At a bar or nightclub (11 percent)
- At work (11 percent)
- On public transportation (6 percent)
- On the street (5 percent)
The most severe consequences of phone theft include fraudulent charges (12 percent) and even identity theft (9 percent). As a result, about 90 percent of smartphone theft victims said they tried to get their phone back, including 60 percent who said they filed a police report. But 10 percent of these theft victims made no effort at all to recover their phone, primarily because they just didn’t know where to start.
To learn more, visit Lookout’s complete Phone Theft in America Report, which includes consumer tips on how to best handle a theft scenario. For more information on Lookout, please visit www.lookout.com. To download Lookout’s app, visit the Google Play or App Store.
The survey was conducted online by IDG Research on behalf of Lookout between March 4 and March 20, 2014. The survey was fielded to respondents in the U.S., U.K., France, and Germany who reported owning a smartphone. Quotas were set to ensure that approximately 500 respondents (2,403 complete responses) from each country had their smartphones stolen at some point, while another 100 respondents from each country were allowed to complete the survey despite never having their smartphone stolen.
Lookout secures the new generation of mobile computing for individuals and organizations everywhere. With a global network of tens of millions of devices and the world’s most comprehensive mobile data set, Lookout provides powerful threat protection that makes the world more secure as it becomes more connected. Lookout's cloud-based platform leverages predictive analytics and machine learning to provide unparalleled insight into malicious and anomalous behaviors, application usage and network dynamics. These insights enable Lookout to counter threats, often before they put data, devices and networks at risk. With partners and customers worldwide, Lookout has offices in San Francisco, London and Tokyo. For more information, please visit www.lookout.com.
SYS-CON Events announced today that Key Information Systems, Inc. (KeyInfo), a leading cloud and infrastructure provider offering integrated solutions to enterprises, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Key Information Systems is a leading regional systems integrator with world-class compute, storage and networking solutions and professional services for the most advanced softwa...
Oct. 10, 2015 07:30 AM EDT Reads: 419
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Oct. 10, 2015 07:00 AM EDT Reads: 5,915
DevOps and Continuous Delivery software provider XebiaLabs has announced it has been selected to join the Amazon Web Services (AWS) DevOps Competency partner program. The program is designed to highlight software vendors like XebiaLabs who have demonstrated technical expertise and proven customer success in DevOps and specialized solution areas like Continuous Delivery. DevOps Competency Partners provide solutions to, or have deep experience working with AWS users and other businesses to help t...
Oct. 10, 2015 06:00 AM EDT Reads: 242
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Oct. 10, 2015 06:00 AM EDT Reads: 526
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 10, 2015 06:00 AM EDT Reads: 266
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Oct. 10, 2015 06:00 AM EDT Reads: 813
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applicati...
Oct. 10, 2015 05:00 AM EDT Reads: 729
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Oct. 10, 2015 04:00 AM EDT Reads: 600
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, foc...
Oct. 10, 2015 04:00 AM EDT Reads: 519
The cloud has reached mainstream IT. Those 18.7 million data centers out there (server closets to corporate data centers to colocation deployments) are moving to the cloud. In his session at 17th Cloud Expo, Achim Weiss, CEO & co-founder of ProfitBricks, will share how two companies – one in the U.S. and one in Germany – are achieving their goals with cloud infrastructure. More than a case study, he will share the details of how they prioritized their cloud computing infrastructure deployments ...
Oct. 10, 2015 03:00 AM EDT Reads: 755
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 10, 2015 03:00 AM EDT Reads: 331
Data loss happens, even in the cloud. In fact, if your company has adopted a cloud application in the past three years, data loss has probably happened, whether you know it or not. In his session at 17th Cloud Expo, Bryan Forrester, Senior Vice President of Sales at eFolder, will present how common and costly cloud application data loss is and what measures you can take to protect your organization from data loss.
Oct. 10, 2015 03:00 AM EDT Reads: 593
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
Oct. 10, 2015 02:15 AM EDT Reads: 772
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet condit...
Oct. 10, 2015 02:00 AM EDT Reads: 659
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 10, 2015 02:00 AM EDT Reads: 317