<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How to prevent Virtual Theft</title>
	<atom:link href="http://www.gfi.com/blog/prevent-virtual-theft/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/prevent-virtual-theft/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=prevent-virtual-theft</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/prevent-virtual-theft/comment-page-1/#comment-354</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 09 Nov 2009 11:21:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1571#comment-354</guid>
		<description><![CDATA[Wow takes some guts to characterize such practice as a bug! This story you mention might also be expanded to be a cautionary tale for installing games / other software on mobile devices used for work reasons. The potential is there when you install software to turn your device into a spy gadget of sorts. 

I have to admit I am not really familiar with mobile device development but once an application is installed and trusted I expect it has full access to your device and could potentially, when presented with an Internet connection send out, mobile numbers and possibly smses, calendar events and maybe even notes present in your mobile device. More insidiously I guess it can initiate an Internet connection itself via WiFi or even GPRS. That being said I do know that some mobile phones ask for permission before allowing applications access to certain things such as the WiFi or GPS data, however with a little social engineering I bet people can easily be convinced to allow it.

So I certainly agree with you John. Beware that even mobile devices can be a target. As with everything else ensure not to run anything you don&#039;t trust and are absolutely sure of its origin.]]></description>
		<content:encoded><![CDATA[<p>Wow takes some guts to characterize such practice as a bug! This story you mention might also be expanded to be a cautionary tale for installing games / other software on mobile devices used for work reasons. The potential is there when you install software to turn your device into a spy gadget of sorts. </p>
<p>I have to admit I am not really familiar with mobile device development but once an application is installed and trusted I expect it has full access to your device and could potentially, when presented with an Internet connection send out, mobile numbers and possibly smses, calendar events and maybe even notes present in your mobile device. More insidiously I guess it can initiate an Internet connection itself via WiFi or even GPRS. That being said I do know that some mobile phones ask for permission before allowing applications access to certain things such as the WiFi or GPS data, however with a little social engineering I bet people can easily be convinced to allow it.</p>
<p>So I certainly agree with you John. Beware that even mobile devices can be a target. As with everything else ensure not to run anything you don&#8217;t trust and are absolutely sure of its origin.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/prevent-virtual-theft/comment-page-1/#comment-353</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Sun, 08 Nov 2009 15:51:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1571#comment-353</guid>
		<description><![CDATA[It should be noted that mobile gamers have also been targeted for mischief. In a disturbing case involving Storm8, a maker of video games for the iPhone and iPod Touch, it was discovered that the game vendor was harvesting cellphone numbers with its application.

Since mobile numbers are like gold to marketers, Storm8, which claims 20 million downloads of its games, was essentially using its game to mint money for itself.

After the company&#039;s dubious activity was exposed this summer, it fixed the problem, which it characterized as an &quot;oversight&quot; and a &quot;bug&quot; in the software. However, that didn&#039;t deter a class action lawsuit from being filed against the company last week. In that suit (http://www.prnewschannel.com/pdf/Complaint_Storm_8_Nov_04_2009.pdf), the plaintiffs aren&#039;t buying Storm8&#039;s &quot;bug&quot; defense. They argue in their compaint filed in a federal district court in California:

&quot;Storm8’s characterizations of its practice of harvesting phone numbers as a bug”and an “oversight” are false. Storm8 could not have accidentally harvested its users’ phone numbers. It used very specific and specialized software code to do so.&quot;

Since iPhones are so popular among upper level executives, this kind of theft could present corporate computer security personnel with even more severe problems than online gaming scams that may victimize their rank-and-file users.]]></description>
		<content:encoded><![CDATA[<p>It should be noted that mobile gamers have also been targeted for mischief. In a disturbing case involving Storm8, a maker of video games for the iPhone and iPod Touch, it was discovered that the game vendor was harvesting cellphone numbers with its application.</p>
<p>Since mobile numbers are like gold to marketers, Storm8, which claims 20 million downloads of its games, was essentially using its game to mint money for itself.</p>
<p>After the company&#8217;s dubious activity was exposed this summer, it fixed the problem, which it characterized as an &#8220;oversight&#8221; and a &#8220;bug&#8221; in the software. However, that didn&#8217;t deter a class action lawsuit from being filed against the company last week. In that suit (<a href="http://www.prnewschannel.com/pdf/Complaint_Storm_8_Nov_04_2009.pdf" rel="nofollow">http://www.prnewschannel.com/pdf/Complaint_Storm_8_Nov_04_2009.pdf</a>), the plaintiffs aren&#8217;t buying Storm8&#8242;s &#8220;bug&#8221; defense. They argue in their compaint filed in a federal district court in California:</p>
<p>&#8220;Storm8’s characterizations of its practice of harvesting phone numbers as a bug”and an “oversight” are false. Storm8 could not have accidentally harvested its users’ phone numbers. It used very specific and specialized software code to do so.&#8221;</p>
<p>Since iPhones are so popular among upper level executives, this kind of theft could present corporate computer security personnel with even more severe problems than online gaming scams that may victimize their rank-and-file users.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 15:01:04 by W3 Total Cache --