Latest news with #Lookout


Time Out
5 days ago
- Time Out
Four local trails have been named among Australia's best winter hikes
Who says you have to stay inside during winter in Melbourne? (To be fair though, we do love nursing a vino in a cosy wine bar or enjoying a Sunday roast at a pub with a fireplace.) Well, definitely not the outdoor experts at AllTrails – according to them, winter is actually a hugely popular time to get out in nature, with the hike-mapping app reporting its highest number of navigations during the colder months. So after analysing the data and crunching some numbers, they've rounded up the ten most popular winter hikes in Australia, and four trails around Victoria have made the cut. Guess it's time to lace up your boots, pop on some layers and face the frosty conditions. We reckon these scenic tracks are well worth it. Werribee Gorge Circuit Walk, Pentland Hills This 7.6-kilometre loop features a hiking trifecta: gorgeous views, rock scrambling and, for the brave, a post-hike swimming hole (if you can brave the chill in winter!). Our favourite photo spot is the Eastern Lookout at the gorge, which offers panoramic views of the park's coolest natural wonders. Yarra Bend Park Loop, Melbourne Just a short drive from Melbourne's CBD, this relaxed 9.2-kilometre track on the traditional lands of the Wurundjeri people weaves through the city's largest natural bushland park. Look out for rainbow lorikeets, red-rumped parrots, yellow-tailed black cockatoos and possums. Highlights include Dights Falls and Studley Park Boathouse – the oldest public boathouse on the Yarra River recently underwent a huge renovation, and is a beautiful spot to refuel. Mount Lofty Loop, Wonga Park This five-kilometre mountain climb has a lot going for it – there are plenty of uphills to get the blood pumping, but you'll be rewarded with stunning views of the Yarra Valley stretching all the way to the Dandenong Ranges. You may even spot some wildlife along the way. It was also named the third most popular trail in Australia for 2024, so you know this one is a certified winner no matter what the weather conditions. Lyrebird Walk, Neuman, Paddy and Coles Ridge Loop, Melbourne Hidden in the Dandenong Ranges, this 6.6-kilometre loop offers a chance to spot the trail's namesake bird. Locals recommend walking anticlockwise to make it a little less strenuous. With lush, green scenery and giant ferns to admire, it's a particularly pretty track – keen photographers may want to bring their cameras. These are Australia's top ten winter hikes, according to AllTrails: Grand Canyon Track, Blue Mountains, NSW Werribee Gorge Circuit Walk, Pentland Hills, VIC Yarra Bend Park Loop, Melbourne, VIC Whistlepipe Gully and Lesmurdie Falls, Perth, WA Spit Bridge to Manly Walk, Sydney, NSW Mount Lofty Loop, Wonga Park, VIC Enoggera Reservoir Circuit, Brisbane, QLD Pages Pinnacle, Numinbah Valley, QLD Lyrebird Walk, Neuman, Paddy and Coles Ridge Loop, Melbourne, VIC Bondi Beach to Coogee Beach Walk, Sydney, NSW


Time Out
27-05-2025
- Time Out
These are Australia's 10 most popular winter hikes, as rated by locals
The weather might be cooling down, but Australia's love for hiking is seriously heating up. According to AllTrails, winter is officially peak trekking season, with Aussies recording their highest number of navigations during the cooler months. So, where's everyone walking? The hike-mapping app has analysed the data and revealed the top ten most popular hikes in Australia this winter. See you on the tracks… 1. Grand Canyon Track, Blue Mountains, NSW Australia's most popular winter hike also claimed the crown as our nation's favourite hike of 2024. This 6.3-kilometre circuit takes hikers on a magical journey through the World Heritage-listed Blue Mountains National Park, passing gently cascading waterfalls, giant ferns and moss-covered rocky overhangs that look straight out of a fairy tale. 2. Werribee Gorge Circuit Walk, Pentland Hills, VIC This 7.6-kilometre loop features a hiking trifecta: gorgeous views, rock scrambling and, for the brave, a post-hike swimming hole. Our favourite photo spot is the Eastern Lookout at the gorge, which offers panoramic views of the park's coolest natural wonders. 3. Yarra Bend Park Loop, Melbourne, VIC Just a short drive from Melbourne's CBD, this relaxed 9.2-kilometre track on the traditional lands of the Wurundjeri people weaves through the city's largest natural bushland park. Look out for rainbow lorikeets, red-rumped parrots, yellow-tailed black cockatoos and possums. 4. Whistlepipe Gully and Lesmurdie Falls Loop, Perth, WA You'll need around two hours to conquer this mostly easygoing hiking route in Western Australia's popular Mundy Regional Park. The circuit combines Whistlepipe Gully and Lesmurdie Falls in a nice, approachable package to suit most fitness levels, and yes, dogs are welcome too. 5. Spit Bridge to Manly Walk, Sydney, NSW This gorgeous coastal trail hugs the northern edge of Sydney Harbour for ten beautiful kilometres. Though it's a popular summer hike (the route takes you to some of Sydney's most stunning harbour beaches), it's almost as popular in winter, with plenty of cafés to refuel in Manly. 6. Mount Lofty Loop, Wonga Park, VIC This five-kilometre mountain climb has a lot going for it – there are plenty of uphills to get the blood pumping, but you'll be rewarded with stunning views of the Yarra Valley stretching all the way to the Dandenong Ranges. 7. Enoggera Reservoir Circuit, Brisbane, QLD Just a 20-minute drive from Brisbane's CBD, this 10.9-kilometre lakeside loop is the most popular winter hike in Queensland. While it's quite hilly, the track is broken up into three sections for you to tackle at your own pace. 8. Pages Pinnacle, Numinbah Valley, QLD Winter is prime time to take on this six-kilometre out-and-back trail as you'll dodge the sweltering summer heat. While it's relatively steep, hikers will be rewarded with spectacular views overlooking Hinze Dam and the Gold Coast from the summit. 9. Lyrebird Walk, Neuman, Paddy and Coles Ridge Loop, Melbourne, VIC Hidden in the Dandenong Ranges, this 6.6-kilometre loop offers a chance to spot the trail's namesake bird. Locals recommend walking anticlockwise to make it a little less strenuous. 10. Bondi Beach to Coogee Beach Walk, Sydney, NSW Another Sydney classic is the six-kilometre Bondi to Coogee coastal walk, which is easily accessible from the CBD and takes in some of Sydney's most famous beaches. A winter swim is optional, but highly recommended.
Yahoo
20-05-2025
- Politics
- Yahoo
Immigrant student restrictions bill could cause Tennessee Republican conflict in 2026
A move to bring back a bill to bar immigrant children from attending Tennessee public schools could cause friction between House Republican Caucus Chair Jeremy Faison, left, and House Majority Leader William Lamberth, who sponsored the 2025 measure. (Photo: John Partipilo/Tennessee Lookout) Tennessee House Republican leadership could hit an impasse again in 2026 over a measure designed to restrict immigrant student enrollment in public schools. With the bill on the skids in mid-April at the end of the legislature's session, House Republican Leader William Lamberth asked the U.S. Department of Education whether $1.1 billion in federal funds would be jeopardized by his bill, which would enable school districts to check students' immigration status and charge tuition. Lamberth had not received a response as of May 19, and whether the House moves forward with the bill in January 'depends on the response we receive,' House Republican Caucus spokesperson Jennifer Easton said Monday in response to questions from the Lookout. The Senate version of the bill passed in this year's session despite public outcry. But if Lamberth continues to push the measure in 2026 as he said he would, he's likely to run into a conflict with Rep. Jeremy Faison, chairman of the Republican Caucus. That being said, I still strongly oppose the state passing a bill that puts children, who have zero decision making power, in the middle of a legal battle. – House Republican Caucus Chair Jeremy Faison Faison, of Cosby, told WBIR-TV's 'Inside Tennessee' he was a 'big fat no' on the legislation and challenged the strategy of trying to put the measure before the U.S. Supreme Court, the Tennessee Journal reported. Faison backed off his initial statement in which he called the bill a 'political stunt,' saying he shouldn't have questioned the motives of Lamberth, of Portland, and Sen. Bo Watson, of Hixson, who sponsored the bill. 'That being said, I still strongly oppose the state passing a bill that puts children, who have zero decision making power, in the middle of a legal battle,' Faison told the Lookout. The House version of the legislation would give school districts the option to check students to determine whether they have permanent legal documentation, differing from the Senate version, which would force districts to check students' immigration status and require tuition. Tennessee bill denying immigrant children right to an education dead for year Faison said Monday he supports President Donald Trump's efforts to secure the Southern border and wants to see Congress repair the nation's immigration laws so states don't have to debate policies dealing with federal issues. Yet, he said he never liked the bill dealing with immigrant students. Faison reportedly said on WBIR that Attorney General Jonathan Skrmetti told him the U.S. Supreme Court would never take up the immigrant student case, which was designed to overturn a 1982 decision that found all children should be allowed to enroll in public schools no matter their immigration status. Federal Title VI prohibits discrimination based on race, color or national origins in programs that receive federal funds, and violating the law could put the federal funds in danger, according to a state financial analysis. Those deal with the Every Student Succeeds Act — which measures student success —, the Individuals with Disabilities Act, the Carl Perkins Act — named for the late Kentucky Congressman Carl Perkins, it funds career and technical education — and school nutrition. SUBSCRIBE: GET THE MORNING HEADLINES DELIVERED TO YOUR INBOX


Forbes
13-05-2025
- Business
- Forbes
The Human Layer Is The New Attack Surface
An employee types on a keyboard, unaware that a convincing message they just received is part of a ... More sophisticated social engineering attack. Cybersecurity has long been defined by digital borders—network perimeters, firewalls, and hardened endpoints. But today, the most vulnerable surface in an organization isn't a server, application, or device. It's a person. As modern workflows expand across smartphones, messaging apps, and public clouds, the traditional perimeter has effectively disappeared. At the same time, attackers have shifted their strategies away from exploiting technical vulnerabilities and toward manipulating human behavior—weaponizing trust, urgency, and context. The new battleground isn't technical. It's psychological. And it's getting smarter. 'Threat actors tend to exploit the weakest link in the chain—and today, that's clearly the human element,' said Jim Dolce, CEO of Lookout. 'People have become the primary target in the evolving threat landscape.' Social engineering has always been an effective tactic, but the rise of generative AI has drastically raised the stakes. Threat actors now use AI to craft tailored spear phishing messages, simulate voice calls from executives, and even create deepfake videos—tricking employees into taking actions they'd otherwise question. Dolce pointed to recent high-profile breaches at major hospitality chains where attackers didn't break in through firewalls—they logged in using stolen credentials harvested through mobile phishing schemes. The impersonation of a trusted colleague, especially when delivered via a text message or phone call, can short-circuit a person's judgment. These attacks are often short, simple, and urgent—designed to create a sense of immediacy that overwhelms cautious thinking. And while enterprise defenses have long focused on protecting desktops and email gateways, mobile devices remain undersecured, underwatched, and overexposed. Unlike email, SMS and messaging apps don't offer clues about sender domains or metadata. Users are often left to make split-second decisions on whether to trust a message based on tone and timing alone. Modern cyberattacks increasingly target users via their mobile phones. That's where people read texts from unknown numbers, receive spoofed calls, and see urgent messages demanding action. The challenge is compounded by the fact that mobile devices blur the boundary between work and personal life, operating outside of enterprise security stacks while handling sensitive tasks and data. Attackers know this—and they're taking full advantage. "You can invest in training to help employees identify, prevent, and respond to cyber threats, but it's not enough to stop highly sophisticated or stealthy attacks," Dolce noted. "For example, an attacker using phone number spoofing—falsifying caller ID to appear as a trusted or familiar contact—is extremely difficult to train against." This isn't hypothetical. Threat actors can now clone a person's voice with seconds of publicly available audio. Tools already exist to generate synthetic video in real time. And with services capable of spoofing phone numbers or mimicking familiar writing styles, a message that sounds legitimate often is enough to prompt dangerous action—especially from a mobile device, mid-task, on the go. For years, the phrase 'the user is the weakest link' has been a cybersecurity cliché. It's also been a convenient scapegoat. But in a world where even seasoned professionals struggle to detect deepfakes or spoofed numbers, blaming the user is not just unfair—it's a strategic failure. People will make mistakes. They'll click links, follow instructions, and respond to messages that feel real. Designing security systems that assume perfection from the workforce is a losing game. Instead, security needs to adapt to human behavior, not punish it. This means rethinking everything from phishing simulations to endpoint controls. It means shifting from reactive detection to proactive defense. And it requires AI—not as a buzzword, but as a foundational component of human-centric protection. Security tools must now operate with context—understanding what's normal for each user, detecting anomalies in real time, and blocking deceptive messages before they reach a recipient. Protection must extend beyond managed devices and email filters to encompass mobile platforms, personal apps, and cloud-based collaboration tools. The shift toward human-layer attacks represents a significant business risk. When an employee is tricked into giving up credentials or transferring funds, the damage extends beyond IT. It impacts compliance, brand reputation, and trust. That's why human-centric security must be elevated to the level of enterprise risk management. CISOs and CIOs must collaborate with HR, legal, and executive leadership to embed security into organizational culture—while simultaneously deploying the right technology to defend employees in the moment. Real protection means giving users the benefit of the doubt—and the tools to make better decisions. This problem will only get worse. As AI technology becomes more accessible, cheaper, and faster, attackers will become more convincing, more scalable, and more automated. The good news? The same technologies that empower adversaries can also be used to defend against them—if we move quickly and think differently. The future of cybersecurity won't be built just on stronger walls. It will be built on smarter systems that understand people—how they think, how they behave, and how to protect them from exploitation. Because in today's threat landscape, trust is no longer a given. It's an attack vector.
Yahoo
12-05-2025
- Business
- Yahoo
Lookout Announces Sale of Its Cloud Security Business to Fortra
BOSTON, May 12, 2025--(BUSINESS WIRE)--Lookout, Inc., the leader in mobile endpoint security, today announced the sale of its Cloud Security line of business to Fortra, a company dedicated to breaking the cyber attack chain with advanced offensive and defensive security solutions. Under the terms of the agreement, Fortra will acquire all assets, intellectual property, and personnel associated with the business. The divestiture reflects Lookout's strategic focus on its core strength in Mobile Endpoint Security and positions both organizations for sustained long-term growth. "Following this transaction, we will focus our resources and investments on Endpoint Security, where we see strong opportunities for growth and value creation," said Jim Dolce, CEO of Lookout. "We're confident Fortra is the right partner to advance Lookout's Cloud Security business and continue delivering exceptional service to its customers." In March 2024, Lookout entered a strategic partnership with Fortra, enabling the launch of Fortra's Digital Guardian Secure Service Edge (SSE) solution, built on the Lookout Cloud Security Platform. With fully trained teams actively selling and supporting the platform, Fortra is well-positioned to drive the business forward. The solution is already integrated into Fortra's Data Protection Suite, alongside Digital Guardian DLP and Data Classification. "Our top priority during this transition is to ensure a seamless experience for our Cloud (SSE) customers, partners, and employees," said Dolce. "We know Fortra will continue to provide the high standards of service and support our customers and partners have come to expect." "We're thrilled to welcome Lookout's SSE solutions, customers, partners, and employees to Fortra," said Matt Reck, CEO of Fortra. "This acquisition strengthens our cloud security capabilities and supports our strategic vision for continued focus on Fortra's cybersecurity offerings." About Lookout Lookout is the recognized leader in mobile security, trusted by governments, enterprises, and small businesses worldwide. The company pioneered the mobile security industry in 2009 and has built the largest and most advanced dataset in the market, protecting over 220 million devices and analyzing over 325 million apps. Powered by AI-driven mobile threat intelligence and supported by a world-class research team, Lookout delivers unmatched protection and proactive threat detection. As mobile devices become the primary gateway to corporate identity and data, organizations face growing blind spots. Traditional security tools leave SOC teams without critical visibility into mobile risks, rendering them vulnerable to sophisticated cross-platform social engineering attacks. Lookout's Mobile EDR closes this gap by providing real-time threat detection, investigation, and response, enabling security teams to stay ahead of evolving threats and keep their organizations safe. To learn more, visit and follow Lookout on our blog, LinkedIn and X. © 2025 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design® and the Lookout multi-color/multi-shaded Wingspan Design® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, and the 4 Bar Shield Design. Contact Lookout PR: press@ About Fortra Fortra provides advanced offensive and defensive security solutions that deliver comprehensive protection across the cyber kill chain. With complete visibility across the attack chain, access to threat intelligence spanning the globe, and flexible solution delivery, Fortra customers can anticipate criminal behavior and strengthen their defenses in real time. Break the attack chain at Copyright © Fortra, LLC and its group of companies. Fortra™, the Fortra™ logos, and other identified marks are proprietary trademarks of Fortra, LLC. View source version on Contacts Media ContactJessica RyanPR ManagerFortraPR@ Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data