Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Jon McNeill, Elizabeth White, Pat Romanski, Carmen Gonzalez

News Feed Item

Lookout Raises the Bar on Adware Classification

Lookout, the leader in security technology that protects people and businesses from mobile threats, today announced its standard for classifying adware. Adware is an ad network that exhibits intrusive behavior without gaining appropriate consent from a user, which can pose a privacy risk. Additionally, Lookout now flags ad networks newly classified as adware in Lookout Mobile Security for Android, providing users with new insight and information on how to remove any applications containing adware.

Mobile privacy is an increasingly important topic for consumers and app developers, and adware is a risk to user privacy and one of the most prevalent threats on mobile worldwide. Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, and approximately 6.5% of free apps on Google Play today contain adware. In the past year, Lookout estimates that more than one million US Android users downloaded adware.

Ad networks are a vital element in the mobile ecosystem, allowing app developers a way to offer free applications to consumers. Ad networks that overstep user privacy bounds or negatively affect user experience create conflict, compromising not only consumers’ privacy and user experience, but also the developer community that relies on mobile ad networks to bring free products to market.

To date, there has not been a widely-adopted set of guidelines that define what constitutes adware by the broader mobile industry. Lookout defines adware as an ad network that exhibits one or more of the following intrusive behaviors without requesting appropriate user consent: display advertising outside of the normal app experience, harvest unusual personally identifiable information, or perform unexpected actions as a response to ad clicks. Appropriate user consent entails providing a clear alert in the application that allows the user to accept or decline before any of the above behaviors takes place.

Lookout has demonstrated an ongoing commitment in guiding the industry to safer mobile advertising practices. In July 2012, Lookout released Mobile App Advertising Guidelines, a playbook aimed to curb aggressive ad network behavior and encourage the mobile advertising and developer communities to adopt practices that prioritize transparency and user privacy.

The Lookout app for Android now flags ad networks that Lookout classifies as adware, so Lookout users have the ability to make more informed decisions about the apps they have on their device. Download the Lookout app for Android from Google Play.

Adware Data:

  • Lookout found that the global likelihood of a new Android Lookout user having adware on their device is 1.6%, which is relatively higher than other mobile threats.
  • In the US, a new Lookout user has a 0.9% likelihood of having adware on their device, as recently released in Lookout’s Mobile Threats Around the World report.
  • In the past year, Lookout estimates that more than one million U.S. Android users downloaded adware.
  • Today, approximately 6.5% of free apps on Google Play contain adware, but the prevalence of adware in third-party app stores is significantly higher.
  • Lookout found adware is most prevalent in personalization (26%), racing (23%) and sports games (18%) applications categories.

How to Stay Safe:

  • When downloading apps, make sure you are aware of and comfortable with the application’s permissions before giving consent.
  • Only download apps from official app stores, such as Google Play or the App Store.
  • Use a security app, like Lookout, that will inform you if adware is detected on your device.

Tips for Developers:

  • Provide transparency and context to users about the data an application is accessing or collecting.
  • Pick a responsible ad network by carefully researching the ad network’s user experience and privacy policy.
  • Handle device and identifying user data responsibly (data should always be transmitted and stored using strong encryption).

About Lookout

Lookout builds security software that protects people, businesses and networks from mobile threats. Leveraging a network of more than 40 million devices worldwide, Lookout proactively prevents fraud, protects data and defends privacy to make the world safer as more people and devices become connected. Lookout Mobile Security, the flagship consumer product is available on Android, iOS and Kindle. Lookout was selected as a 2013 World Economic Forum Technology Pioneer company and received the 2013 Laptop Editor’s Choice Award. Lookout has offices in San Francisco and London, and is funded by Accel Partners, Andreessen Horowitz, Index Ventures, Khosla Ventures and Trilogy Equity Partners. For more information, please visit www.lookout.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice, will review the Federal Risk and Authorization Management Program (FedRAMP) process and provide advice on overcoming common compliance obstacles.
The cloud is now a fact of life but generating recurring revenues that are driven by solutions and services on a consumption model have been hard to implement, until now. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, will discuss how a top European telco has leveraged the innovative recurring revenue generating capability of the consumption cloud to enable a unique cloud monetization mod...
Red Hat has launched the Red Hat Cloud Innovation Practice, a new global team of experts that will assist companies with more quickly on-ramping to the cloud. They will do this by providing solutions and services such as validated designs with reference architectures and agile methodology consulting, training, and support. The Red Hat Cloud Innovation Practice is born out of the integration of technology and engineering expertise gained through the company’s 2014 acquisitions of leading Ceph s...
Are your applications getting in the way of your business strategy? It’s time to rethink your IT approach. In his session at 16th Cloud Expo, Madhukar Kumar, Vice President, Product Management at Liaison Technologies, will discuss a new data-centric approach to IT that allows your data, not applications, to inform business strategy. By moving away from an application-centric IT model where data integration and analysis are subservient to the constraints of applications, your organization will b...
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will disc...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance...
Analytics is the foundation of smart data and now, with the ability to run Hadoop directly on smart storage systems like Cloudian HyperStore, enterprises will gain huge business advantages in terms of scalability, efficiency and cost savings as they move closer to realizing the potential of the Internet of Things. In his session at 16th Cloud Expo, Paul Turner, technology evangelist and CMO at Cloudian, Inc., will discuss the revolutionary notion that the storage world is transitioning from me...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, will demonstrate the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He will discuss from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT ...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been ...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, will analyze a range of cloud offerings (IaaS, PaaS, SaaS) and discuss the benefits/challenges of migrating to each of...
Platform-as-a-Service (PaaS) is a technology designed to make DevOps easier and allow developers to focus on application development. The PaaS takes care of provisioning, scaling, HA, and other cloud management aspects. Apache Stratos is a PaaS codebase developed in Apache and designed to create a highly productive developer environment while also supporting powerful deployment options. Integration with the Docker platform, CoreOS Linux distribution, and Kubernetes container management system ...
The results of a global study commissioned by CA Technologies reveal that mobile and desktop applications have become the new battleground for brand loyalty. In today’s software-driven world, where consumers are more discerning about what they expect from applications, the reality is that businesses that fail to deliver a positive application experience risk losing as much as a quarter of their customer base. “Consumers no longer view applications as nice-to-have novelties. They now have a hug...