"Malicious gadgets -- if a user were to download one of them --
could be used in a variety of other attacks, including one where
one gadget steals information from another, a valuable attack
against gadgets that store personal user information, Hansen and
Stracener said. "How do you know it's a legitimate gadget?" Hansen
asked. "Because someone uploaded it? There's no moderation; there's
no way to guarantee it won't turn bad.""
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.