{"id":1208,"date":"2009-10-29T10:25:54","date_gmt":"2009-10-29T17:25:54","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1208"},"modified":"2016-02-12T09:57:43","modified_gmt":"2016-02-12T17:57:43","slug":"loselose-is-it-a-game-is-it-malware-its-both","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/","title":{"rendered":"lose\/lose: Is it a Game? Is it Malware? It&#8217;s Both!"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png\"><\/p>\n<p>Intego&#8217;s Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space Invaders, but with a new twist. As the developer describes it on his web site, <\/p>\n<blockquote><p>\nEach alien in the game is created based on a random file on the players computer. If the player kills the alien, the file it is based on is deleted. If the players ship is destroyed, the application itself is deleted.\n<\/p><\/blockquote>\n<p>Hmm&#8230; You play a game and it deletes files? Your files? That doesn&#8217;t sound very good.<\/p>\n<p>Developer Zach Gage claims that this is part of his MFA thesis, and while that&#8217;s certainly believable, it seems an odd way to write a thesis: a game that may delete user&#8217;s files is, quite frankly, a malicious program. Gage is trying to dress this up in philosophical concepts; he told us:<\/p>\n<blockquote><p>\nI would even argue that Lose\/Lose does good and not harm, as it&#8217;s part of a project bringing this kind of matter to our attention. Part of it is about examining this flaw in our reasoning. We are so afraid of technology that we can become enraged just at the idea of a dangerous piece of software, even when that software is no more dangerous than dragging your files to the trash and deleting them yourself. In a world where so much of our lives are online, shouldn&#8217;t we have passed this fear by now? If we haven&#8217;t perhaps theres a greater danger to continuing to move forward into this technological future than we&#8217;ve come to terms with. When files on your computer are more important physical possessions, the rules of the game change. Imagine if someone could remotely delete furniture from your house, food from your fridge, or work from your desk? Wouldn&#8217;t you want to know even the basics of how that system worked before you integrated it so heavily into your life?\n<\/p><\/blockquote>\n<p>High-concept art is nothing new, but applying that to malicious computer programs certainly is. While the program has even been part of an <a href=\"http:\/\/www.electrofringe.net\/2009\/electroonline\/\">Australian digital art exhibit<\/a>, that doesn&#8217;t make it any better. <\/p>\n<p>Malware as art could be fine in an exhibit, but releasing it in the wild is risky. Granted, the program has clear warnings about what it will do, both on pages where it can be downloaded, and on the game&#8217;s splash screen, but this will simply show that those who don&#8217;t read &#8211; or, perhaps, whose native languages are not English &#8211; may end up losing valuable files.<\/p>\n<p>Intego is considering this as malware, with the name OSX\/LoserGame, and VirusBarrier X5 with virus definitions dated October 28, 2009 or later will delete this game. If you see it, don&#8217;t try playing it, unless you really want to lose files.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego&#8217;s Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space Invaders, but with a new twist. As the developer describes it on his web site, Each alien in the game is created based on a random file on the players computer. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[2707,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego&#039;s Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"lose\/lose: Is it a Game? Is it Malware? It&#039;s Both! - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego&#039;s Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-10-29T17:25:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T17:57:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/\",\"name\":\"lose\/lose: Is it a Game? Is it Malware? It's Both! - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#primaryimage\"},\"datePublished\":\"2009-10-29T17:25:54+00:00\",\"dateModified\":\"2016-02-12T17:57:43+00:00\",\"description\":\"Intego's Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"lose\/lose: Is it a Game? Is it Malware? It&#8217;s Both!\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"lose\/lose: Is it a Game? Is it Malware? It&#8217;s Both!\",\"datePublished\":\"2009-10-29T17:25:54+00:00\",\"dateModified\":\"2016-02-12T17:57:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#webpage\"},\"wordCount\":477,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png\",\"keywords\":[\"lose\/lose\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego's Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/","og_locale":"en_US","og_type":"article","og_title":"lose\/lose: Is it a Game? Is it Malware? It's Both! - The Mac Security Blog","og_description":"Intego's Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space","og_url":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-10-29T17:25:54+00:00","article_modified_time":"2016-02-12T17:57:43+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/","name":"lose\/lose: Is it a Game? Is it Malware? It's Both! - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#primaryimage"},"datePublished":"2009-10-29T17:25:54+00:00","dateModified":"2016-02-12T17:57:43+00:00","description":"Intego's Virus Monitoring Center has come across an odd new program. Called lose\/lose, this is a kind of alien-killer game like the venerable Space","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"lose\/lose: Is it a Game? Is it Malware? It&#8217;s Both!"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"lose\/lose: Is it a Game? Is it Malware? It&#8217;s Both!","datePublished":"2009-10-29T17:25:54+00:00","dateModified":"2016-02-12T17:57:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#webpage"},"wordCount":477,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/lose.png","keywords":["lose\/lose","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/loselose-is-it-a-game-is-it-malware-its-both\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ju","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1208"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1208"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1208\/revisions"}],"predecessor-version":[{"id":50101,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1208\/revisions\/50101"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}