Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Lookout Expands Mobile Security Capabilities With Acquisition of Bluebox Security

Enterprise mobile security startup Bluebox security has agreed to be acquired by Lookout, a provider of mobile consumer and business mobile security products.

While Lookout started with a focus on consumer mobile security, the company has expanded its portfolio to target the enterprise technology market.

Enterprise mobile security startup Bluebox security has agreed to be acquired by Lookout, a provider of mobile consumer and business mobile security products.

While Lookout started with a focus on consumer mobile security, the company has expanded its portfolio to target the enterprise technology market.

Bluebox technology components will be added to Lookout’s core security platform and enable more advanced solutions for the company’s enterprise customers, Lookout said, which will further help the company tap the business market.

As part of its offerings, Bluebox provides a cloud-based mobile security solution that gives enterprises visibility, control, and security for mobile data, while providing privacy and freedom to employees as they use their mobile devices. The company also offers solutions designed to create “self defending” mobile apps.

San Francisco-based Lookout raised a massive $150 million round of funding in August 2014, and roughly $282 million in total funding to date.

The terms of the acquisition were not disclosed.

Founded in 2012 by Adam Ely and Caleb Sima, Bluebox emerged from stealth mode in 2012 with $9.5 Million in Funding Led by Andreessen Horowitz. The company has raised additional capital since, including an $18 million round in January 2014. 

Prior to launching Bluebox, Sima served as an “Entrepreneur in Residence” at Andreessen Horowitz. Sima also previously served as Chief Technology Officer for HP’s Application Security Center after joining the company as a result of HP’s acquisition of SPI Dynamics in 2007, a company he co-founded and as CTO oversaw development of WebInspect – a Web application security testing tool.

Advertisement. Scroll to continue reading.

Ely was previously CISO of the Heroku business unit at salesforce.com. Prior to salesforce.com, Adam led security operations, application security, and compliance for TiVo. Before TiVo, he led security functions at Disney.

In July 2013, Bluebox was credited with discovering a serious “master key” vulnerability in Android, which would allow attackers to easily turn legitimate apps into Trojans, without affecting the cryptographic signature. In 2014, the company also discovered a “Fake ID” vulnerability in Adnroid which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet.

Following the acquisition, Bluebox development and marketing personnel will join the Lookout team.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.