<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Hacking Devices &#8211; How to protect yourself from data theft</title>
	<atom:link href="http://www.gfi.com/blog/hacking-devices/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/hacking-devices/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hacking-devices</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/hacking-devices/comment-page-1/#comment-578</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 04 Dec 2009 16:44:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1590#comment-578</guid>
		<description><![CDATA[Yes I know what you mean. Two years ago I had written an article predicting that Game Consoles would be the next target for botnets. Well obviously compromised consoles that were modified to allow unsigned code to execute. Having such processing power and being online most of the time, they seemed to be a perfect target. Microsoft and Sony seemed to have done a very good job however since their products weren&#039;t compromised yet and so are completely immune to viruses and botnets. 

Maybe one day mobile phones will be just as powerful processing wise that they can also afford a similar level of security. However with mobile phones it can be tricky as you wouldn&#039;t really want to cut out any external development for mobile phones but maybe some middle ground can be found such as being freely able to sign your application or any other and then deploy it on your mobile phone. Of course like this you would have a weak link that someone might convince you to sign and install a game / application with attached malware.

It can be tricky but I guess there is such a thing as a middle ground that doesn&#039;t completely close a device but protects it against unauthorized execution.]]></description>
		<content:encoded><![CDATA[<p>Yes I know what you mean. Two years ago I had written an article predicting that Game Consoles would be the next target for botnets. Well obviously compromised consoles that were modified to allow unsigned code to execute. Having such processing power and being online most of the time, they seemed to be a perfect target. Microsoft and Sony seemed to have done a very good job however since their products weren&#8217;t compromised yet and so are completely immune to viruses and botnets. </p>
<p>Maybe one day mobile phones will be just as powerful processing wise that they can also afford a similar level of security. However with mobile phones it can be tricky as you wouldn&#8217;t really want to cut out any external development for mobile phones but maybe some middle ground can be found such as being freely able to sign your application or any other and then deploy it on your mobile phone. Of course like this you would have a weak link that someone might convince you to sign and install a game / application with attached malware.</p>
<p>It can be tricky but I guess there is such a thing as a middle ground that doesn&#8217;t completely close a device but protects it against unauthorized execution.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/hacking-devices/comment-page-1/#comment-446</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Sat, 28 Nov 2009 17:00:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1590#comment-446</guid>
		<description><![CDATA[You might want to add to your list of mobile phone vulnerabilities viruses and worms. As you may know, in recent weeks certain iPhones that have been modified, or jailbroken, have been a bonanza for malware writers. The attacks began innocently enough with a virus that only changed the wallpaper on an infected phone. A second strain, though, began filching email contacts, SMS messages, calendar items and multimedia files. The third iteration of the worm upped the ante even more. It turned the phone into a zombie on a botnet. Ironically, the author of the first virus, called ikee, landed a lucrative job with an iPhone app developer, no doubt because of the notoriety he gained by his exploits. Who says crime doesn&#039;t pay?]]></description>
		<content:encoded><![CDATA[<p>You might want to add to your list of mobile phone vulnerabilities viruses and worms. As you may know, in recent weeks certain iPhones that have been modified, or jailbroken, have been a bonanza for malware writers. The attacks began innocently enough with a virus that only changed the wallpaper on an infected phone. A second strain, though, began filching email contacts, SMS messages, calendar items and multimedia files. The third iteration of the worm upped the ante even more. It turned the phone into a zombie on a botnet. Ironically, the author of the first virus, called ikee, landed a lucrative job with an iPhone app developer, no doubt because of the notoriety he gained by his exploits. Who says crime doesn&#8217;t pay?</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 03:41:24 by W3 Total Cache --