Andrew Blaich
Andrew Blaich is Head of Device Intelligence at Lookout where he is focused on mobile threat hunting and vulnerability research. Prior to Lookout, Andrew was the Lead Security Analyst at Bluebox Security. He holds a Ph.D. in computer science, and engineering from the University of Notre Dame in enterprise security and wireless networking. In the past Andrew has worked at both Samsung and Qualcomm Research. Andrew is a regular presenter at security conferences including BlackHat, RSA, Kaspersky SAS, SecTor, SANS DFIR, Interop, and ACSC. In his free time he loves to run and hack on IoT.
My Articles
Stealth Mango and Tangelo | Surveillanceware Stealing Data
Lookout Security Intelligence has discovered Android and iOS surveillanceware tools targeting govt. officials, diplomats, military personnel, and activists.
New Surveillanceware in Google Play Targeting Middle East
Lookout researchers have identified a new, highly targeted surveillanceware family known as Desert Scorpion in the Google Play Store.
Mobile Safari Scareware Campaign Thwarted
Apple released an update to iOS (10.3) changing how Mobile Safari handles JavaScript pop-ups after Lookout discovered scammers using the functionality to execute scareware.
A Closer Look at iOS 9.3.3: Apple Patches 43 Security Vulnerabilities
Apple released the latest version of iOS version 9.3.3 on July 18 including patches for 43 security vulnerabilities.
Pokemon Go: New Tampered Apps & What You Can Do
Pokemon Go, is arguably the biggest mobile game in US history, but while fame breeds fans — even employees in the enterprise — it also attracts many opportunistic attackers.
Linux Flaw Allows Anyone to Hijack Internet Traffic
Lookout has discovered that an exploit in TCP also impacts nearly 80% of Android, or around 1.4 billion devices, based on an install base reported by Statista.
An Inside Look at Nation-State Cyber Surveillance Programs
Based on attacker communications found on a command and control server, this talk provides rare insight into a nation state’s $23 million surveillance program.
Mobile Vulnerabilities What They Are & How They Impact Enterprise
Mobile device vulnerabilities can have equally devastating consequences, including compliance fines and brand reputation loss.
Data Compromise via Mobile Threats: Enterprises Facing Attacks
Mobile threats are more complex than a piece of malware in a third-party app store. In this blog post we dissect the “threats” component of the Mobile Risk Matrix.
DirtyCow and Drammer Vulnerabilities | Android Threats
Two especially critical flaws that allow an attacker to root or completely compromise a device have just been added to the litany of vulns on Android devices.