Game developers Vs. Cybercriminals

Cybersecurity has been a serious issue for online gaming companies, as well as any online business. The question is: Who gets affected the most? During last week's Game Developers Conference in San Fransisco, various accounts of run ins with hackers showed that online gaming gets hit the hardest. Based on the revelations, it was shown that online gaming companies still haven't come to terms with how clued up hackers, cheaters, griefers, and cybercriminals actually are

The potential ramifications for gaming companies are significant: degradation of the play environment, fraud prevention technology integration costs, customer support costs, billing transaction costs, billing charge-back fees (from stolen credit cards used to open accounts), fines from credit card brands, enforcement false positives (turning away legitimate customers), and problems selling digital goods.

At the Game Developers Conference last Wednesday afternoon, Patrick Wyatt (worked on Warcraft, Diablo, Starcraft, Guild Wars, and Aion), COO of En Masse Entertainment, recounted his extensive experience with hackers, cheaters, griefers, and cybercriminals in an effort to help game developers understand that game security can't be an afterthought.

"Hacking games is as easy to do now as it was 20 years ago," Wyatt lamented, pointing to the recently released blockbuster Modern Warfare 2, which is vulnerable to a character speed hack.

Wyatt suggested possible defenses, which includes: device fingerprinting, proxy detection, phishing site detection and takedown, transaction reviews, telephone verification, shipping address verification, two-channel authentication, and use of game analytics to watch for unusual behavior, having source code on a separate network, having strong authentication for developers and operations personnel, and investing in physical site security.

At last week's Game Developers Conference, accounts of run ins with hackers have shown many gaming firms haven't grasped how cybercrime can ruin everything.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: October 29, 2014 @ 11:00 a.m. ET / 8:00 a.m. PT Are you interested in building a cognitive application using the power of IBM Watson? Need a platform that provides speed and ease for rapidly deploying this application? Join Chris Madison, Watson Solution Architect, as he walks through the process of building a Watson powered application on IBM Bluemix. Chris will talk about the new Watson Services just released on IBM bluemix, but more importantly he will do a step by step cognitive …

  • Live Event Date: November 13, 2014 @ 2:00 p.m. ET / 11:00 a.m. PT APIs can be a great source of competitive advantage. The practice of exposing backend services as APIs has become pervasive, however their use varies widely across companies and industries. Some companies leverage APIs to create internal, operational and development efficiencies, while others use them to drive ancillary revenue channels. Many companies successfully support both public and private programs from the same API by varying levels …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds