Van Rooij E.,Lookout Inc.
Circulation Research | Year: 2011
Originally identified as moderate biological modifiers, microRNAs have recently emerged as powerful regulators of diverse cellular processes with especially important roles in disease and tissue remodeling. The rapid pace of studies on microRNA regulation and function necessitates the development of suitable techniques for measuring and modulating microRNAs in different model systems. This review summarizes experimental strategies for microRNA research and highlights the strengths and weaknesses of different approaches. The development of more specific and sensitive assays will further illuminate the biology behind microRNAs and will advance opportunities to safely pursue them as therapeutic modalities. © 2011 American Heart Association, Inc.
Lookout Inc. | Date: 2016-07-25
The method disclosed herein provides for performing device security corrective action based on loss of proximity to another device, such as a key device. While a mobile communication device is locked, a mobile communication device determines whether or not a key device is within a specified distance. If the key device is not within the specified distance from the mobile communication device, a notification may be displayed on the mobile communication device. If a user responds to the notification, the user may prevent or alter the mobile communication device from performing at least one device security corrective action. If, however, the user does not respond to the notification within a specified time period, the at least one device security corrective action is performed on the mobile communication device.
Lookout Inc. | Date: 2015-09-01
A system and method including: determining, by a manager module, a need to determine a primary software component of a client device; identifying a first software component and a second software component of the client device; identifying a set of characteristics of the first software component and the second software component; determining that the first software component is the primary software component based on the set of characteristics of each software component, where determining the primary software component further includes comparing the set of characteristics of each software component and selecting the primary software component based on the set of characteristics with a highest priority; and instructing, by the manager module, the one or more processors to cause functionality associated with the second software component to be at least partially suspended.
Lookout Inc. | Date: 2016-06-22
Security is enhanced for a user of a mobile communications device by monitoring and controlling resource usage. First information associated with each of a plurality of mobile communications devices is collected, including configurations and settings for applications, components, resources and external resources for each mobile communications device. The collected information is used to identify an application, component, resource or external resource that is currently active on two of the mobile communications devices. Second information is transmitted to the first of the two mobile communications devices to reduce or terminate usage of the identified application, component, resource or external resource on the first mobile communications device.
Lookout Inc. | Date: 2016-02-22
A software application is automatically launched on a first computing device. The launch of the application is a first execution of the application by the first computing device. In response to this launching, the application executes to automatically obtain data from the first computing device. The data is sent to a second computing device that is configured to provide a service to the first computing device (e.g., based on the data).
Lookout Inc. | Date: 2015-12-17
Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
Lookout Inc. | Date: 2015-05-18
Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device.
Lookout Inc. | Date: 2015-11-10
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.
Lookout Inc. | Date: 2015-01-30
A system and method identifies mobile applications that are likely to have an adverse effect on a mobile network if accessed by mobile communication devices. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application is likely to have an adverse effect on a mobile network when accessed by a plurality of mobile devices. A mobile device, computer device, or server, may monitor behavioral data, apply a model to the data, and create a disposition. They may aggregate behavioral data or disposition information from multiple devices. They may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, they may enact corrective actions, such as generating device or network configuration data.
Lookout Inc. | Date: 2015-02-27
Methods for assessing the current security state of a mobile communications device to determine access to specific tasks is presented. A security component on a server is configured to receive a request to access services from a mobile communications device for a specific task. The security component on the server is further configured to determine whether a security state for the mobile communications device is acceptable for access to the services. Based on the security state for the mobile device being determined to be acceptable for access to the services, access to the services is granted and a determination is whether the security state is acceptable for access to the specific task requested. Based on the security state being determined to be acceptable for access to the specific task requested, access to the specific task requested is granted by the server security component.