New research from ESET, which polled over 500 gamers, has found that 6% of gamers have spent around a full-day immersed in a video game.
This piece looks at the five threats online gamers face and what they can do to protect themselves. It's important to be wary of these to stay safe and secure.
Santiago Sassone, a senior corporate communications specialist, on why security is a transversal issue for video games development.
Professional gamers offer their insight into video game safety, helping players all over the world stay safe and secure from cybercriminal activity.
Online gaming and cybercrime are more connected than you might think. We explore how online games are becoming the new hunting ground for cybercriminals looking to earn and learn.
Have you spoke to your kids lately? We bet if you have, then you are all too familiar with what they tend to talk about – video games. While you may still be clueless about the ins and outs, its worth reading up on online gaming, as there are plenty of risks you never knew possible.
Guild Wars 2's security team serves tough justice on teleporting hacker.
Video games have gone since the late 1970s and early 1980s from being a small offshoot of the "traditional" computing industry to becoming a full-fledged multi-billion dollar industry - with its own brand of criminal.
[UPDATE #1: (21 Dec 2012, 5:30PM) ESET Researcher Cameron Camp has just published the second part of this series on securing your Android device. Read it here on the ESET Threat Blog at Securing Your Holiday Tech Gifts, Part 2: Android Guide. AG] December is upon us, and whether you have a Christmas tree, menorah,
There’s a new batch of malware making the rounds, this time directed at spreading banking malware through childrens’ games. Though it’s hard to imagine, the scammers are taking advantage of the naivete of kids, who may not be as skilled at detecting scams as their more seasoned parents. According to an article in Softpedia, the
...whatever the hacker community's personal taste is in games and consoles, gamers are a tempting target...
Update: It seems like the initial article is inaccurate and that Paul Rellis never made any such comments about a 14 year old breaking into the X-Box live servers and have not offered to mentor him http://kotaku.com/5805742/microsoft-is-helping-an-xbox-live-hacker-develop-his-talent TekGoblin reports (http://www.tekgoblin.com/2011/05/27/14-year-old-call-of-duty-hacker-hired-by-microsoft/) that a teenager who broke into the Call of Duty Modern Warfare 2 gameservers last
The Electronic Entertainment Expo, or E3, opens in Los Angeles on June 15th. There will be a lot of news coming out of this major expo and that means a lot of press. Microsoft, Sony, and Nintendo are all set to announce new games and motion control devices that are certain to attract a lot
A number of new papers have been added to the white papers page: Cristian Borghello’s “Playing Dirty” is a translation of his original Spanish paper, available on the ESET Latin America web site, and describes in detail how criminals make money out of stealing online gaming credentials and assets. My paper Social Security Numbers: Identification is
Just a few short days ago I read the announcement that Microsoft announced a new relationship with the social networking services Twitter and Facebook. The relationship was created to enable users of Xbox Live to access their profiles and post photos to their Facebook accounts and allow Twitter users to post and read messages –
Here at ESET we have just released our Global ThreatTrends report for January 2009. Not surprisingly, at the top of the list is a family of programs that exploit Microsoft’s longest unpatched vulnerability. That’s right, Autorun.inf, is an evil “feature” that should have been patched out of existence a long time ago. Since it is
The top ten (twenty, twenty-five…) season doesn’t seem to have finished yet: the latest to cross my radar was something like seven ways of surviving the recession, which I’m sure is of interest to all of us, but not really in scope for this blog. So here’s a snippet from our 2008 Global Threat Report,