<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://www.paradisesgarage.com:443/mcweb2/utility/FeedStylesheets/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Links</title><link>https://www.paradisesgarage.com:443/mcweb2/forums/93.aspx</link><description>Post interesting links on the internet that you find here. Make sure all links are appropriate and work safe.</description><dc:language>en</dc:language><generator>CommunityServer 2008.5 SP1 (Build: 31106.3070)</generator><item><title>Mobiles Attacked with Apps</title><link>https://www.paradisesgarage.com:443/mcweb2/forums/thread/3352.aspx</link><pubDate>Tue, 18 May 2010 10:12:24 GMT</pubDate><guid isPermaLink="false">b2ff3ccb-892e-4ceb-9a77-e4f6e73f7f60:3352</guid><dc:creator>DarkAstraea</dc:creator><slash:comments>0</slash:comments><comments>https://www.paradisesgarage.com:443/mcweb2/forums/thread/3352.aspx</comments><wfw:commentRss>https://www.paradisesgarage.com:443/mcweb2/forums/commentrss.aspx?SectionID=93&amp;PostID=3352</wfw:commentRss><description>&lt;p&gt;&lt;blockquote&gt;&lt;div&gt;&amp;quot;The pace of innovation on mobile phones and other smart wireless 
devices has accelerated greatly in the last few years. ... But now the 
attackers are beginning to outstrip the good guys on mobile platforms, developing
 innovative new attacks and methods for stealing data that rival 
anything seen on the desktop, experts say. This particular attack vector
 &amp;mdash; introducing malicious or Trojaned applications into mobile app stores
 &amp;mdash; has the potential to become a very serious problem, researchers say. 
Tyler Shields, a security researcher at Veracode who developed a 
proof-of-concept spyware application for the BlackBerry earlier this 
year, said that the way app stores are set up and their relative lack of
 safeguards makes them soft targets for attackers. ... &amp;#39;There are 
extremely technical approaches like the OS attacks, but that stuff is 
much harder to do,&amp;#39; Shields said. &amp;#39;From the attacker&amp;#39;s standpoint, it&amp;#39;s 
too much effort when you can just drop something into the app store. It 
comes down to effort versus reward. The spyware Trojan approach will be 
the future of crime. Why spend time popping boxes when you can get the 
users to own the boxes themselves? If you couple that with custom 
Trojans and the research I&amp;#39;ve done, it&amp;#39;s super scary.&amp;#39;&amp;quot;&lt;/div&gt;&lt;/blockquote&gt;&lt;/p&gt;
&lt;p&gt;Really, now.....who couldn&amp;#39;t see this coming. Imagine the amount of information that can be stolen from apps, such as mobile banking. Good thing I&amp;#39;m not a phone addict.&lt;/p&gt;
&lt;p&gt;(&lt;a target="_blank" href="http://threatpost.com/en_us/blogs/coming-wave-mobile-attacks-051710"&gt;Click Meh&lt;/a&gt;)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>