Irdeto joined the world’s leading broadcast, satellite, content delivery, digital media, film, and audio entertainment specialists at the 2019 CABSAT conference, and its clear piracy is still a hot topic. For the first time, CABSAT […]
A new year has begun, and that means one thing: resolutions. Although they are known to be easily broken, it is imperative that you stick to your 2019 security resolutions. It’s that time of the […]
Cracking, pirating and cheating in the world of gaming is not new, game piracy is running rampant with more than 2.5billion gamers all over the world, just over 237 million were searching for pirated content […]
In the dictionary, a “Window of Opportunity” is defined as “a favorable opportunity for doing something that must be seized immediately if it is not to be missed.” For video and online game publishers, the window of opportunity for a new game is pretty short. Fourteen days short, to be exact.
In the latest Cloakware® Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application. This simple demonstration captures the essentials […]
How many of your online accounts or services require passwords? So many to remember. What’s your personal technique – your children’s names; adding a number each time it needs updating or a password manager?
Irdeto’s Cybersecurity Services team obtained a copy of the largest aggregated database of stolen credentials.
We’ve just introduced a new Youtube video series by Cloakware® Cate. Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in preparation for hacking your code, […]
Why should hackers rely on finding a zero-day or unpatched vulnerability? The most common way they break into accounts or networks is by stealing credentials. What’s more they’re easy to obtain.
How are credentials stolen?
Given our addiction to being ‘always connected’, it’s no surprise that WiFi based attacks are a fertile source of stolen credentials.
Picture Bob. He thinks he’s figured out how to avoid paying for cable TV by watching programs streamed from pirate websites. One day, he’s watching a live football broadcast and ten minutes into the game, he loses all access. His screen goes blank. Is ruining the user experience on pirated sites a new combat strategy?
Seeing it differently
Degrading user experience may not be the first thing that comes to mind when considering how to combat cybercrime.
The Internet has transformed how businesses operate today. Never before has so much been done online. The dark side to this connectivity is that the threat of cybercrime is increasing and becoming more professional. It’s no longer a case of if you will fall victim to a cyber-attack but when. Are you ready?
No business is immune
It’s not just Irdeto’s cyber-services team which is witnessing a growing concern about cyber-attack threats.