Is Pokemon GO a No Go for Security

22 Jul 2016

Is Pokemon GO a No Go for Security

The news has been awash this week with stories of Pokémon GO, the latest mobile craze developed by Niantic in partnership with Nintendo.

The free-to-play location-based augmented reality game allows players to capture, battle and train virtual creatures, called Pokémon, who appear on device screens as though in the real world. Worldwide interest in the game has been phenomenal and, in just a few weeks, Pokémon GO has reportedly more active daily users than Twitter. However, as with most popular online endeavours, cybercriminals have been quick to exploit the game for nefarious purposes.

Unofficial Pokemon GO applications could have malware.

Pokémon GO has not been simultaneously released across the world, and players who cannot face the wait for it to be released in their country have found ways to download it through unofficial channels. Unfortunately, some of these versions have been infected with malicious code to gain access to devices. By installing one of these unofficial applications, a device may be vulnerable to an attacker who could gain access to any data on the phone as well as the ability to make phone calls, send text messages and use the microphone and camera. This poses obvious risks to individuals, but if business professionals have downloaded the game onto a device that they take to work, valuable business information could be leaked if the microphone or camera are exploited.

Mitigate the risks

To help mitigate potential risks, players should make sure they check the permissions for the application to ensure that it is not accessing more than the camera, location services, contacts and the memory storage card. If that version of the game does then users should reinstall it and download the official game from the Google Play store (there are no reported malicious apps in Apple’s App Store).


For the latest PGI updates like our pages on LinkedIn–  PGIPGICyber  Facebook– PGIPGI Cyber  and Twitter


Share this article

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Weekly Cyber Bytes email where you'll be receiving updates, tips and narrative around what has been happening in the world of information security.

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP