Forza Horizon 4 Quietly Removes Popular Dance Emotes Amidst Lawsuits

Following lawsuits against Fortnite for stealing dances, Microsoft quietly removes 2 popular emotes from Forza Horizon 4.
The post Forza Horizon 4 Quietly Removes Popular Dance Emotes Amidst Lawsuits appeared first on Thurrott.com.
Continue reading Forza Horizon 4 Quietly Removes Popular Dance Emotes Amidst Lawsuits

Epic Games login tokens were susceptible to theft, research shows

Epic Games, best known for the mega-popular video game “Fortnite,” fixed a vulnerability in its web infrastructure that hackers could have abused to access user accounts, as evidenced by a report from cybersecurity firm Check Point published Wednesday. The exploit involves phishing, but victims don’t need to be tricked into handing over credentials for it to work, the report shows. The bug only required that the targets visit a malicious link, where their login tokens could be leaked to the attackers. This type of access could have allowed hackers to see victims’ personal information, listen to their in-game voice chat and purchase V-Bucks — the game’s virtual currency — with other players’ accounts, Check Point said. Researchers said they found two old sub-domains belonging to Epic Games containing vulnerabilities that allowed for a malicious redirect attack. In a technical report, researchers describe how they were able to take control of these domains and use them to […]

The post Epic Games login tokens were susceptible to theft, research shows appeared first on CyberScoop.

Continue reading Epic Games login tokens were susceptible to theft, research shows

Fortnite vulnerabilities would have allowed attackers to intercept and steal login credentials

Researchers at Check Point today shared details of vulnerabilities that could have affected any player of the hugely popular online battle game, Fortnite. Vulnerability impact If exploited, the vulnerability would have given an attacker full access to … Continue reading Fortnite vulnerabilities would have allowed attackers to intercept and steal login credentials

How Hackers Exploit Online Games

Legitimate platforms like online gaming services are a breeding ground for hackers, with in-game currencies and micro-transactions putting a target on the gaming industry’s back Online games have also provided a testing ground for hackers keen to… Continue reading How Hackers Exploit Online Games

Fortnite Scams, Google Search Privacy, Bloomberg SuperMicro Controversy – #81

This is the 81st episode of the Shared Security Podcast sponsored by Silent Pocket and Edgewise Networks was hosted by Tom Eston and Scott Wright recorded on October 29, 2018. Listen to this episode and previous ones direct via your web … Continue reading Fortnite Scams, Google Search Privacy, Bloomberg SuperMicro Controversy – #81