<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
			xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
		
	>
<channel>
	<title>Comments on: Separating the hype from the reality in Android malware</title>
	<atom:link href="http://research.gigaom.com/2013/07/separating-the-hype-from-the-reality-in-android-malware/feed/" rel="self" type="application/rss+xml" />
	<link>http://research.gigaom.com/2013/07/separating-the-hype-from-the-reality-in-android-malware/</link>
	<description></description>
	<lastBuildDate>Thu, 05 Mar 2015 18:27:33 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>By: Colin Gibbs</title>
		<link>http://research.gigaom.com/2013/07/separating-the-hype-from-the-reality-in-android-malware/#comment-1812</link>
		<dc:creator><![CDATA[Colin Gibbs]]></dc:creator>
		<pubDate>Tue, 16 Jul 2013 20:42:12 +0000</pubDate>
		<guid isPermaLink="false">http://pro.gigaom.com/?post_type=go_shortpost&#038;p=183305#comment-1812</guid>
		<description><![CDATA[Thanks for the comments, Fred.

You&#039;re right that there&#039;s no way for IT managers to control everything BYOD users do with their devices. Which is why education is the key: Businesses must have clear policies regarding activity on their mobile devices, they must make sure their employees know and understand those policies, and they must enforce them.

Mobile malware is a real threat, both within Google Play and (especially) in third-party app stores. But those threats are often blown far out of proportion by vendors of security software and by reporters and bloggers who parrot those claims.]]></description>
		<content:encoded><![CDATA[<p>Thanks for the comments, Fred.</p>
<p>You&#8217;re right that there&#8217;s no way for IT managers to control everything BYOD users do with their devices. Which is why education is the key: Businesses must have clear policies regarding activity on their mobile devices, they must make sure their employees know and understand those policies, and they must enforce them.</p>
<p>Mobile malware is a real threat, both within Google Play and (especially) in third-party app stores. But those threats are often blown far out of proportion by vendors of security software and by reporters and bloggers who parrot those claims.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: fredhstein</title>
		<link>http://research.gigaom.com/2013/07/separating-the-hype-from-the-reality-in-android-malware/#comment-1811</link>
		<dc:creator><![CDATA[fredhstein]]></dc:creator>
		<pubDate>Tue, 16 Jul 2013 16:51:00 +0000</pubDate>
		<guid isPermaLink="false">http://pro.gigaom.com/?post_type=go_shortpost&#038;p=183305#comment-1811</guid>
		<description><![CDATA[Curious about the phrase &quot;entirely overblown&quot;. 

As an individual, with a current OS and using only Google Play and avoiding porn, I agree that it is easy to be secure 

As for the IT manager, how does they control what all the BYOD users do? what App Stores or sites they visit?]]></description>
		<content:encoded><![CDATA[<p>Curious about the phrase &#8220;entirely overblown&#8221;. </p>
<p>As an individual, with a current OS and using only Google Play and avoiding porn, I agree that it is easy to be secure </p>
<p>As for the IT manager, how does they control what all the BYOD users do? what App Stores or sites they visit?</p>
]]></content:encoded>
	</item>
</channel>
</rss>
