Cracking, pirating and cheating in the world of gaming is not new, game piracy is running rampant with more than 2.5billion gamers all over the world, just over 237 million were searching for pirated content […]
In the dictionary, a “Window of Opportunity” is defined as “a favorable opportunity for doing something that must be seized immediately if it is not to be missed.” For video and online game publishers, the window of opportunity for a new game is pretty short. Fourteen days short, to be exact.
How many of your online accounts or services require passwords? So many to remember. What’s your personal technique – your children’s names; adding a number each time it needs updating or a password manager?
Irdeto’s Cybersecurity Services team obtained a copy of the largest aggregated database of stolen credentials.
Why should hackers rely on finding a zero-day or unpatched vulnerability? The most common way they break into accounts or networks is by stealing credentials. What’s more they’re easy to obtain.
How are credentials stolen?
Given our addiction to being ‘always connected’, it’s no surprise that WiFi based attacks are a fertile source of stolen credentials.
The impact of global cybercrime is shocking: 38.5% of firms have experienced a cyberattack in the past 12 months and 21% of cyberattacks result in costs exceeding €5M. Financial services is arguably the industry most targeted by hackers. As such, these numbers will likely skyrocket as the industry undergoes disruption.
Picture Bob. He thinks he’s figured out how to avoid paying for cable TV by watching programs streamed from pirate websites. One day, he’s watching a live football broadcast and ten minutes into the game, he loses all access. His screen goes blank. Is ruining the user experience on pirated sites a new combat strategy?
Seeing it differently
Degrading user experience may not be the first thing that comes to mind when considering how to combat cybercrime.
APIs are everywhere in modern day life. We rely on them to access services on mobiles, tablets and laptops. Without them our day-to-day life wouldn’t be the same. Yet they are also increasing the attack surface. Are they really a friend to e-commerce or to cybercrime?
APIs are not new. They’ve been around a long time. APIs are key to building scalable web-based applications as they allow and manage the interaction between 2 online connected services.
The Internet has transformed how businesses operate today. Never before has so much been done online. The dark side to this connectivity is that the threat of cybercrime is increasing and becoming more professional. It’s no longer a case of if you will fall victim to a cyber-attack but when. Are you ready?
No business is immune
It’s not just Irdeto’s cyber-services team which is witnessing a growing concern about cyber-attack threats.
We naturally assume banks are safe. But why? From legendary bank robbers: Jesse James or Bonnie & Clyde, banks have always been a target. Today’s bank robbers are cybercriminals. And they are targeting not only the banks but also consumers.
Every couple of months cyber-attacks on banks make the headlines. Be it the Carbanak cybergang’s biggest ever online bank heist, a distributed denial of service attacks on RBS/Natwest or a Polish bank being held to ransom
Could an innocent device like a STB, webcam or home thermostat be used by hackers to attack you? In the current world of the Internet of Things (IoT), the answer is Yes! Leading to the name Internet of Threats. But operators have the power to change this.
IoT promises connected convenience at consumer’s fingertips. From adjusting your home heating when you land back at the airport, to checking your home security remotely if the alarm goes off while you’re out. Consumers depend on their operator to be the trusted party and remove any privacy or security implications.