Last month, Kaspersky discovered that Asus’s live update system was infected with malware, an operation it called Operation Shadowhammer. Now we learn that six other companies were targeted in the same operation. As we mentioned before, ASUS was not the only company used by the attackers. Studying this case, our experts found other samples that … Read More “More Attacks against Computer Automatic Update Systems” »
Category: games
Auto Added by WPeMatico
Long and interesting story — now two decades old — of massive fraud perpetrated against the McDonald’s Monopoly sweepstakes. The central fraudster was the person in charge of securing the winning tickets. Powered by WPeMatico
Evidence that stolen credit cards are being used to purchase items in games like Clash of Clans, which are then resold for cash. Powered by WPeMatico
I play Pokémon Go. (There, I’ve admitted it.) One of the interesting aspects of the game I’ve been watching is how the game’s publisher, Niantic, deals with cheaters. There are three basic types of cheating in Pokémon Go. The first is botting, where a computer plays the game instead of a person. The second is … Read More “Fraud Detection in Pokémon Go” »
Denuvo is probably the best digital-rights management system, used to protect computer games. It’s regularly cracked within a day. If Denuvo can no longer provide even a single full day of protection from cracks, though, that protection is going to look a lot less valuable to publishers. But that doesn’t mean Denuvo will stay effectively … Read More “Denuvo DRM Cracked within a Day of Release” »
An early preview. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
Interesting. Powered by WPeMatico
An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games. Powered by WPeMatico
Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards for that session can be determined. The program can be easily parallelized. This analysis can be finished while sessions are still running this would permit the following type of attack: A … Read More “Hacking Bridge-Hand Generation Software” »
Those of you unfamiliar with hacker culture might need an explanation of “doxing.” The word refers to the practice of publishing personal information about people without their consent. Usually it’s things like an address and phone number, but it can also be credit card details, medical information, private e-mails — pretty much anything an assailant … Read More “Doxing as an Attack” »