Lookout’s Identity Monitoring data comes from Internet forums and websites, web pages, IRC channels, refined PII search engine queries, Twitter feeds, P2P sources, hidden and anonymous web services, malware samples, botnets, and torrent sources.
Articles in this section
- How do I upgrade to Premium Plus on iOS?
- How will I know Identity Protection is available for my device?
- What is breach report?
- How do I delete my personal information I've provided for Identity Protection?
- What personal information is generally taken when a breach occurs?
- What is a breach?
- I’m not sure what was in my wallet. Can you notify my banks and cancel all of my cards?
- How do breaches happen?
- Where does Lookout store my personal information?
- If personal information is taken in a breach, will it be used for identity theft?