How to keep hackers out of your online gaming and personal accounts.

Views expressed in this cybersecurity-cybercrime update are those of the reporters and correspondents.

Accessed on 12 April 2022, 2017 UTC.

Content provided by email subscription to “PC Mag Security Watch.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGmvpJVBJtVJhXDzWTGJngpNbSL

Please click link or scroll down to read your selections.

How to Protect Your Online Gaming Accounts From Hackers

Once upon a time, I called myself a gamer. I streamed on Twitch, I watched every OpTic Gaming video on YouTube, and I don’t want to even think about the amount of GFuel I consumed. But was I really a gamer? After all, my accounts (all deleted now) were never hacked, a rarity in the heady days of 2014, when it seemed like online gaming accounts were protected by little more than a password and a prayer.

I was lucky, but let’s be real: I was also terrible at Call of DutyLeague of LegendsSmash, and the handful of esports I tried. My accounts just weren’t worth much to other gamers at the time. In today’s landscape, all gaming accounts are a treasure trove of personal information for enterprising hackers both inside the gaming sphere and in the wider online criminal communities.

What’s in a Name?

Think about all the information a gaming account holds, whether it’s your own or your kids’. In just your screen name, gamer tag, or handle there may be valuable data such as your birth year or common nicknames. Hackers can use these kinds of personally identifiable information (PII) to find you on data broker sites, and use that info to guess your passwords for your logins all over the web.

I recently spoke with Rob Shavell, a privacy expert with Abine’s DeleteMe, an online personal data removal service, about identity theft in the online gaming community. He said that since hackers are now a known element of playing online, gamers of all ages should take steps to secure their identities.

Shavell explained, “The games these days have become bank accounts for kids. They spend their time and they bank their allowance money and parents’ money. You also have a set of people that have some basic hacking skills.” Add in the proliferation of data brokerage online, and there’s plenty of information and incentive for hackers to take over accounts.

Data broker sites contain a wealth of personal information that goes beyond just a name and phone number and that data can be used against you. Shovell stated, “Some of these data brokers now have information about the car you drive and the amount of money you spent on your house, and where you were educated. Your mother’s maiden name, your exact date of birth. These are things that a lot of us tend to use when we’re creating passwords.” Even if your passwords are secure, these details could still be used as challenge questions for logging into some sites.

Hacking for Fun and Profit

If you think stealing gaming accounts is just the petty work of irate fellow gamers or kids pulling off small-time scams, think again. Game account hacking is a lucrative business in some corners of the web, and PII is a cheap commodity. Shovell said automation is the key to the hacking process, noting, “There are tools that hackers can use to scrape all this data and then go try different configurations against different gaming platforms. The sophistication that they bring to those hacks has gone way up. They’ve written software that they trade around on the dark web that makes it easy.”

Hackers don’t even need to always guess the correct password combinations to make a lot of money from their crimes. Shovell said, “They don’t have to be successful more than a half of the time to have a really good business. A few correct times out of every hundred or thousand guesses, and all of a sudden, there’s a lot of accounts getting taken out.”

How to Avoid Online Gaming Hacks

So what can you do if you’re a gamer or the parent of one? The key to security is multi-factor authentication, and for now, the best method that’s secure, convenient, and free is to use an authenticator app.

Here at PCMag, we’re big proponents of multi-factor authentication in all its forms, whether it’s implemented with the aforementioned authenticator apps or with a hardware security key.

Proper password protection is also a must. Each week I ask my readers to use a password manager, and I will continue until more readers stop using the same passwords for multiple logins. Even if you believe your repeated password is unique, why take the chance that a hacker gets it right one time? There are a few decent free password managers out there (even though my beloved Myki is gone). Pick one and give yourself a fighting chance against online criminals.

You should also consider examining your digital footprint. Have you Googled yourself recently? You may be surprised at all the information you find, especially if you’re active on social media or play online games.

If seeing a vast amount of your personal information online gives you the creeps, consider investing in a data removal service such as DeleteMe or IDX Privacy, which has a similar data deleting component. Data removal services submit takedown requests to all kinds of data broker sites on your behalf throughout the year, so you don’t have to. Of course, you can always just do the job yourself for free. Abine created a step-by-step guide to defeating data aggregators.

If you want to take your online security to the next level, you also need to watch what you share on all online platforms. Tackling the data brokers is just one step when it comes to maintaining online privacy. PCMag’s Eric Griffith wrote a handy guide for disappearing from the internet completely.

Get this from a friend? Get it delivered to your inbox weekly. Sign up for the SecurityWatch newsletter.


What Else Is Happening in the Security World This Week?

Google Sues to Stop Puppy Scammer From Targeting Consumers. Google wants its lawsuit to raise awareness about the puppy scams. One major red flag: If you’re asked to pay for the dog using digital gifts cards instead of legit payment services.

Protect Your PC: How to Work From Home Securely. Working from home opens up security risks you just don’t face in the office. When an IT staffer isn’t available, these simple tips will help protect your company’s data, as well as your own.

Microsoft Stops Russian Hackers From Targeting Ukraine With Domain Takeover. The company secures a court order to take over seven internet domains that a Russian state-sponsored hacking group was using to launch phishing attacks.

11 Android Apps Found Secretly Harvesting Data From Millions of Users. A mysterious company in Panama has been paying Android app developers to incorporate an SDK capable of lifting sensitive data from users’ phones, including copy-paste information.

Google Pulls 6 Fake Antivirus Apps From Play Store That Delivered Malware. Security firm Check Point says hackers created the fake antivirus apps in the hopes that unsuspecting users would download them.

TECH DEAL OF THE DAY

If you buy something from our links, we may get a commission from the sale. Learn more here.

New H&R Block Clients get 30% off Online Tax Filing

 Start for FREE

GET DEAL

TODAY’S TOP NEWS

Stop Sharing Your Streaming Passwords

Your beloved niece is a treasure, but perhaps it’s time for her to get her own Netflix account. Security provider Beyond Identity recently published the results of a survey that showed sharing passwords can put privacy and personal data at risk for the account holder. Nearly a third of the survey respondents reported using the same password for all their streaming accounts, which is a big security no-no. You’d never do that, would you? I’m sure you use a strong and unique password for each one of your online accounts.

Beyond Identity’s research noted that some of the negative consequences of account sharing included people on the accounts sharing passwords with other people, some of them total strangers, without the account holder’s knowledge or consent. In some cases, these folks went as far as changing the account holder’s passwords without permission.

As they say, no good deed goes unpunished. Some account holders even reported the credit cards and bank accounts attached to their shared video streaming service accounts were compromised.

So maybe it’s time for people beyond your immediate household to invest in a streaming service for themselves. You can read about easy, non-confrontational ways to remove someone from your streaming account on Beyond Identity’s website.


This Android Malware Can Hijack Phone Calls to Customer Support


US Disrupts ‘Cyclops Blink’ Botnet by Hacking Infected Devices


Vevo Hack Sees YouTube Music Videos for High-Profile Artists Replaced


What the Russian Army Can Teach Us About Security at Home


PCMag Tests the Best Antivirus Protection


TOP TECH DEALS

Want more deals like these delivered to your inbox?

GET OUR BEST DEALS TODAY

Amazon Fire HD 10.1″ 1080p 32GB Wi-Fi Tablet with Hands-free Alexa

$149.99 $99.99

GET DEAL


Dell Inspiron 15 3000 Intel Core i5-1035G1 15.6″ 1080p Laptop (Quickship) w/ code: SAVE15

$638.99 $382.49

GET DEAL


NVIDIA RTX 3090 Alienware Aurora R10 AMD Ryzen 9 5900 Gaming Desktop w/ 32GB RAM, 1TB SSD

$3,799.99 $2,799.99

GET DEAL


Hyper Tough 5-tier Wire Shelf (1750 lb Capacity)

 $65.00

GET DEAL


UGREEN 100W USB-C Multiport GaNFast Wall Charger (for Newer Laptops & Phones) w/ Clip Coupon & Code: 202SVCI3

$79.99 $47.99

GET DEAL


All product and deal information such as discount, price and availability are believed to be accurate as of the time of publication. Please verify these details with the merchant site and check the merchant’s terms and conditions before you buy. Publisher is not responsible for errors or omissions.

SHARE & FOLLOW US

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://cyber-security-intelligence.org

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and Information security)