Search results: game development

EA’s Source: It’s in the Game (and in Hackers’ Hands)

EA’s Source: It’s in the Game (and in Hackers’ Hands)

Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools ...
Security Boulevard

Operation ShadowHammer: Hackers planted malware code in video games

Hackers targeted Asian video game software houses by poisoning developer tools that left game players with trojanised code running on their computers. The post Operation ShadowHammer: Hackers planted malware code in video ...
Getting Ahead of Cybersecurity Challenges in 2022

Getting Ahead of Cybersecurity Challenges in 2022

2020 and 2021 saw more than their fair share of cybersecurity challenges, largely caused by the mass transition to remote work in response to the COVID-19 pandemic. As individuals and businesses rushed ...
Security Boulevard

2021 in Review, Part 1: 5 Cybersecurity Topics that Made News

It’s been another chaotic year in cybersecurity, as protecting web applications and stopping sensitive data breaches remain top-of-mind issues and continue to generate headline news. As 2021 comes to a close, cybersecurity ...
Relay races, batons, and techniques: How to improve your cloud security posture

Relay races, batons, and techniques: How to improve your cloud security posture

In 2008, the US 4x100m relay team was the favorite to win the gold medal at the Beijing Olympics. Not a massive surprise, considering that team included the second fastest athlete in ...
Image icon representing cloud computing.

Cloud Computing: Benefits, Disadvantages & Types of Cloud Computing Services

Cloud computing is the delivery of computing resources over the internet. Learn about its benefits and how to better protect your SaaS data ...

Celebrating the Journey into Cybersecurity: Movies, Military, and Dance Parties

Cybersecurity is one of the fastest-growing fields, not just in computer science but arguably in all industries. What is even more fascinating is that no matter how many newly trained cybersecurity professionals emerge ...
Malicious Life Podcast: Smart TVs - a New Security Battlefield

Malicious Life Podcast: Smart TVs – a New Security Battlefield

Smart Homes are slowly but surely becoming a part of our everyday lives, and so far it seems that Smart TVs - equipped with microphones, cameras, and an internet connection - are ...
LockFile ransomware

LockFile Ransomware Uses Encryption to Avoid Detection

It’s not surprising that ransomware operators were quick to take advantage of the ProxyShell vulnerabilities discovered in Microsoft Exchange servers last April. But a new group, the LockFile ransomware family, has been ...
Security Boulevard
phishing MFA Microsoft Again Most Spoofed as Office 365 Phishing Evolves

Why so Much Resistance to MFA?

I was speaking with a doctor friend the other day. We were chatting about electronic medical records and how her office secured the patient information. She told me about all of the ...
Security Boulevard