Irdeto joined the world’s leading broadcast, satellite, content delivery, digital media, film, and audio entertainment specialists at the 2019 CABSAT conference, and its clear piracy is still a hot topic. For the first time, CABSAT […]
A new year has begun, and that means one thing: resolutions. Although they are known to be easily broken, it is imperative that you stick to your 2019 security resolutions. It’s that time of the […]
Cracking, pirating and cheating in the world of gaming is not new, game piracy is running rampant with more than 2.5billion gamers all over the world, just over 237 million were searching for pirated content […]
In the dictionary, a “Window of Opportunity” is defined as “a favorable opportunity for doing something that must be seized immediately if it is not to be missed.” For video and online game publishers, the window of opportunity for a new game is pretty short. Fourteen days short, to be exact.
How many of your online accounts or services require passwords? So many to remember. What’s your personal technique – your children’s names; adding a number each time it needs updating or a password manager?
Irdeto’s Cybersecurity Services team obtained a copy of the largest aggregated database of stolen credentials.
Why should hackers rely on finding a zero-day or unpatched vulnerability? The most common way they break into accounts or networks is by stealing credentials. What’s more they’re easy to obtain.
How are credentials stolen?
Given our addiction to being ‘always connected’, it’s no surprise that WiFi based attacks are a fertile source of stolen credentials.
The impact of global cybercrime is shocking: 38.5% of firms have experienced a cyberattack in the past 12 months and 21% of cyberattacks result in costs exceeding €5M. Financial services is arguably the industry most targeted by hackers. As such, these numbers will likely skyrocket as the industry undergoes disruption.
Picture Bob. He thinks he’s figured out how to avoid paying for cable TV by watching programs streamed from pirate websites. One day, he’s watching a live football broadcast and ten minutes into the game, he loses all access. His screen goes blank. Is ruining the user experience on pirated sites a new combat strategy?
Seeing it differently
Degrading user experience may not be the first thing that comes to mind when considering how to combat cybercrime.
APIs are everywhere in modern day life. We rely on them to access services on mobiles, tablets and laptops. Without them our day-to-day life wouldn’t be the same. Yet they are also increasing the attack surface. Are they really a friend to e-commerce or to cybercrime?
APIs are not new. They’ve been around a long time. APIs are key to building scalable web-based applications as they allow and manage the interaction between 2 online connected services.
The Internet has transformed how businesses operate today. Never before has so much been done online. The dark side to this connectivity is that the threat of cybercrime is increasing and becoming more professional. It’s no longer a case of if you will fall victim to a cyber-attack but when. Are you ready?
No business is immune
It’s not just Irdeto’s cyber-services team which is witnessing a growing concern about cyber-attack threats.