Saturday, August 11, 2012

Preinstalled Woes for TMobile HTC Users

Randy Abrams, via his Security Through Absurdity blog, discusses the chilling permissions problem he uncovered on his T-Mobile / HTC supplied Android device. It seems a demo of the seemingly innocuous Bejeweled game from Electronic Arts is preinstalled on the device with a range of permissions typically reserved for spyware type applications. Concerning permissions include the ability to:

  • Read and write contact data
  • Send SMS messages
  • Receive SMS messages
  • Determine Course and GPS location
  • Record audio

According to Randy, these extensive permissions aren't a part of the paid version of Bejeweled. In response to Randy's inquiries into the invasive permission problem, EA Games has put the blame on HTC, who in turn has put the blame on T-Mobile. Currently there is no removal option and apparently attempting to remove the demo game manually may void the warranty on the device.

If you own or are considering a purchase of a T-Mobile HTC device, I strongly encourage a read of Randy's excellent discussion of the problem: The Mysterious Permissions of Bejeweled 2.


Preinstalled Woes for TMobile HTC Users

Randy Abrams, via his Security Through Absurdity blog, discusses the chilling permissions problem he uncovered on his T-Mobile / HTC supplied Android device. It seems a demo of the seemingly innocuous Bejeweled game from Electronic Arts is preinstalled on the device with a range of permissions typically reserved for spyware type applications. Concerning permissions include the ability to:

  • Read and write contact data
  • Send SMS messages
  • Receive SMS messages
  • Determine Course and GPS location
  • Record audio

According to Randy, these extensive permissions aren't a part of the paid version of Bejeweled. In response to Randy's inquiries into the invasive permission problem, EA Games has put the blame on HTC, who in turn has put the blame on T-Mobile. Currently there is no removal option and apparently attempting to remove the demo game manually may void the warranty on the device.

If you own or are considering a purchase of a T-Mobile HTC device, I strongly encourage a read of Randy's excellent discussion of the problem: The Mysterious Permissions of Bejeweled 2.


Creating a Password System

Using unique passwords doesn't have to be complex. There are easy tricks you can use - including writing them down. More on this in Creating and Managing a Strong Password System.


How to Remove SecurityTool

The SecurityTool scareware and others like it may prevent access to Task Manager and otherwise prevent your viewing or disabling their malicious processes. Here's how to use Microsoft Process Explorer to Remove SecurityTool scareware and similar threats.


Avira Internet Security 2012

New review posted: Avira Internet Security 2012.


A Breach of Trust

Data breaches are an all too common occurrence. As good (or bad) as our own defenses may be, we have little to no control over the defenses at companies with which we do business. And when those companies are breached, it can be our own personal data that is put at risk.

You can't counter this with antivirus software. Instead, every home user should take a cue from corporate IT and learn the basic principles of how to assess and manage risk. For an overview, see A Breach of Trust.


A Parting Note

Twelve years is a long time. And in that 12 years, a lot has happened in the malware scene. The biggest change, however, has been you dear reader. Over the last twelve years, you've become increasingly savvy about security threats and the need for antivirus software. Selfishly, I'd like to think I had some small part in that but I think the real driver has been one of supply.

A dozen years ago, computers weren't common household appliances. Today they are. And today the discussion isn't about whether you have a computer, it's about whether you have a PC or a Mac. And chances are, whatever you have, you have more than one of them.

Of course, this also means someone in your household has probably taken on the informal role of IT, making sure those computers are patched, the antivirus is updated, and serving as general tech support for everyone else in the house. If you're the IT guru in your home, give yourself a pat on the back. You deserve it.

And now it's time for another change. After a dozen years as your guide, I've decide to leave About.com. This is not without some sadness as I will miss all of you. But the beauty of the Internet is that there really is no such thing as goodbye, it's just I'll see you later. In the meantime, you can always find me on Twitter or Google+ and of course working at my day job.