Security apps for Android get a lot of bad press because a lot of users don't see the point of installing virus scanners—not for Android! But we ...Read more
Lookout Security & Antivirus offers important protection to your Android device vs viruses, , malware and even loss & theft. With over 40 million customers, you can trust Lookout to keep your important data safe. Also with great reviews from ...Read more
Lookout Security & Antivirus offers important protection to your Android device vs viruses, , malware and even loss & theft.
With over 40 million customers, you can trust Lookout to keep your important data safe. Also with great reviews from TechCrunch, LapTop Mag, PCWorld + more agreeing that this is one of the best top 10 free apps and the BEST antivirus for Android phones.
Lookout Security & Antivirus FREE Features include:
-SECURITY & ANTIVIRUS -FIND MY PHONE -BACKUP & RESTORE
Get a 2 week FREE trial of Lookout of its Premium features, including: -Safe Browsing: Block dangerous URLs -Privacy Advisor: See what personal information can be accessed by other apps -Lock & Wipe: Remotely lock your device, post a custom message and erase your data -Other Premium features: photo & call history backup, restore or transfer data to a new device, Premium Tech Support, and More!
Do you have a question about this app?
UPDATED ON: Oct 11, 2014
GRÖSSE: Varies with device
INSTALLATIONS: 50,000,000 - 100,000,000
LATEST VERSION: Varies with device
ANDROID VERSIONVaries with device
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
view network state
Allows an application to view the state of all networks.
full Internet access
Allows an application to create network sockets.
make application always run
Allows an application to make parts of itself persistent, so the system canʼt use it for other applications.
read system log files
Allows an application to read from the systemʼs various log files. This allows it to discover general information about what you are doing with the phone, but should not contain any personal or private information.
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
modify global system settings
Allows an application to modify the systemʼs settings data. Malicious applications can corrupt your systemʼs configuration.
read sync settings
Allows an application to read the sync settings, such as whether sync is enabled for contacts.
write sync settings
Allows an application to modify the sync settings, such as whether sync is enabled for contacts.
Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
delete all application cache data
Allows an application to free phone storage by deleting files in application cache directory. Access is very restricted and usually for system processes.
YOUR PERSONAL INFORMATION
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
read owner data
Allows an application read the phone owner data stored on your phone. Malicious applications can use this to read phone owner data.
write calendar data
Allows an application to modify the calendar events stored on your phone. Malicious applications can use this to erase or modify your calendar data.
write contact data
Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
read user defined dictionary
Allows an application to read any private words, names and phrases that the user may have stored in the user dictionary.
write to user defined dictionary
Allows an application to write new words into the user dictionary.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
edit SMS or MMS
Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages.
Allows the application to control the vibrator.
change your audio settings
Allows application to modify global audio settings such as volume and routing.
Allows the application to control the flashlight.
modify/delete SD card contents
Allows an application to write to the SD card.
discover known accounts
Allows an application to get the list of accounts known by the phone.
manage the accounts list
Allows an application to perform operations like adding, and removing accounts and deleting their password.