SHARE
Facebook X Pinterest WhatsApp

Game developers Vs. Cybercriminals

Cybersecurity has been a serious issue for online gaming companies, as well as any online business. The question is: Who gets affected the most? During last week’s Game Developers Conference in San Fransisco, various accounts of run ins with hackers showed that online gaming gets hit the hardest. Based on the revelations, it was shown […]

Written By
thumbnail
CodeGuru Staff
CodeGuru Staff
Mar 15, 2010
CodeGuru content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Cybersecurity has been a serious issue for online gaming companies, as well as any online business. The question is: Who gets affected the most? During last week’s Game Developers Conference in San Fransisco, various accounts of run ins with hackers showed that online gaming gets hit the hardest. Based on the revelations, it was shown that online gaming companies still haven’t come to terms with how clued up hackers, cheaters, griefers, and cybercriminals actually are

The potential ramifications for gaming companies are significant: degradation of the play environment, fraud prevention technology integration costs, customer support costs, billing transaction costs, billing charge-back fees (from stolen credit cards used to open accounts), fines from credit card brands, enforcement false positives (turning away legitimate customers), and problems selling digital goods.

At the Game Developers Conference last Wednesday afternoon, Patrick Wyatt (worked on Warcraft, Diablo, Starcraft, Guild Wars, and Aion), COO of En Masse Entertainment, recounted his extensive experience with hackers, cheaters, griefers, and cybercriminals in an effort to help game developers understand that game security can’t be an afterthought.

“Hacking games is as easy to do now as it was 20 years ago,” Wyatt lamented, pointing to the recently released blockbuster Modern Warfare 2, which is vulnerable to a character speed hack.

Wyatt suggested possible defenses, which includes: device fingerprinting, proxy detection, phishing site detection and takedown, transaction reviews, telephone verification, shipping address verification, two-channel authentication, and use of game analytics to watch for unusual behavior, having source code on a separate network, having strong authentication for developers and operations personnel, and investing in physical site security.

Recommended for you...

System.Text.Json improvements in .NET 7
Hannes DuPreez
Oct 21, 2022
.NET 7 Release Candidate 2
Hannes DuPreez
Oct 20, 2022
The Top 20 Programming Languages in 2022
Hannes DuPreez
Oct 17, 2022
Is Anyone Hiring Programmers?
Bradley L. Jones
Sep 22, 2022
CodeGuru Logo

CodeGuru covers topics related to Microsoft-related software development, mobile development, database management, and web application programming. In addition to tutorials and how-tos that teach programmers how to code in Microsoft-related languages and frameworks like C# and .Net, we also publish articles on software development tools, the latest in developer news, and advice for project managers. Cloud services such as Microsoft Azure and database options including SQL Server and MSSQL are also frequently covered.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.