Marks reviews off topic that are not.
Continue reading “Hotcakes: Valve Fails The Community Yet Again On Reviews”
Marks reviews off topic that are not.
Continue reading “Hotcakes: Valve Fails The Community Yet Again On Reviews”
Thought you ought to know.
Continue reading “PSA: Denuvo Anti-Cheat In Doom Eternal Is Kernel-Level Driver”
Anti-cheat runs at root level and always launches at boot until uninstalled.
Continue reading “Riot Games Offers Statement On Valorant’s Anti-Cheat”

You know a security issue is going to be a big problem when the National Security Agency is posting an APB for people to update their computers as soon as possible.
The United States Department of Defense has issued a critical security warning advising users of Windows 10 to ensure that their operating systems are up to date. The NSA identified a vulnerability that will allow malicious software to be installed on a machine by fooling Windows into thinking that it is an official update. The most up to date versions of Windows have allegedly patched this bug, and the department warns that it expects exploits to start cropping up in the very near future.
NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows®1 cryptographic functionality. The certificate validation vulnerability allows an attacker to undermine how Windows verifies cryptographic trust and can enable remote code execution. The vulnerability affects Windows 10 and Windows Server 2016/2019 as well as applications that rely on Windows for trust functionality. Exploitation of the vulnerability allows attackers to defeat trusted network connections and deliver executable code while appearing as legitimately trusted entities. Examples where validation of trust may be impacted include:
- HTTPS connections
- Signed files and emails
- Signed executable code launched as user-mode processes
The vulnerability places Windows endpoints at risk to a broad range of exploitation vectors. NSA assesses the vulnerability to be severe and that sophisticated cyber actors will understand the underlying flaw very quickly and, if exploited, would render the previously mentioned platforms as fundamentally vulnerable. The consequences of not patching the vulnerability are severe and widespread. Remote exploitation tools will likely be made quickly and widely available. Rapid adoption of the patch is the only known mitigation at this time and should be the primary focus for all network owners.
Source: NSA
Bungie has released a statement regarding the Destiny 2 bans that MMO Fallout reported on last night. For the sake of clarity, we are posting the statement in its entirety.
We have seen lots of questions about bans being issued in the PC version of Destiny 2. To provide some information, we would like to share some facts.The following is true:
- Destiny 2 cannot automatically ban you, only Bungie can ban a player after a manual investigation
- Yesterday, we banned approximately 400 players on PC
- Bans were applied to players who were using tools that pose a threat to the shared ecosystem of the game
- We did not (and will not) issue any bans for the use of overlays or performance tools, including Discord, Xsplit, OBS, RTSS, etc.
- Information on using third-party applications can be found here: https://www.bungie.net/en/Help/Article/46101
- We are overturning 4 of the bans that were issued during the PC Beta
We are committed to providing an experience that is fun and fair for the millions of players who have joined us in this community.
Security is a constant back and forth on the internet, a never ending battle between business, thieves, and customers, and while customers have an obligation to do more to secure their accounts, the onus also falls on businesses to keep their back end safe. Securing accounts has become more and more of a legal issue in this day and age, with businesses facing heavy ramifications in the form of civil lawsuits and criminal penalties for not keeping their customer’s data safe. With that in mind, we’ve compiled a list of security features that should be utilized by all services, but for some reason may not be.
And of course, our list for consumers:
It will likely never be possible to 100% secure an account, it is impossible, but we can do a hell of a lot more to protect customer data.
If you’ve been following ArcheAge discussion, you’re likely aware of a surge in player claims that their accounts were being subjected to unauthorized attempts to purchase the ArcheAge founders pack. Community Manager Scapes has responded to the allegations by stating that Trion Worlds has not been breached and the purchase attempts are a symptom of the same old account theft that goes on every day.
What happened in the last few hours is sadly nothing new: Every day, bots obtain user credentials from various unprotected sites around the Internet, build lists of login and passwords, and try them on Trion’s servers (along with many other sites). If players consistently use simple or repeated passwords across different online services, these bots may get access to their accounts. Because of the current momentum around ArcheAge, hundreds of millions of such attempts were made from well over a million different IP addresses in the last few weeks, only a fraction of which ended up being successful today.
All players affected by fraudulent charges will be refunded by Trion Worlds, and the Glyph client is being boosted with additional security features.
(Source: ArcheAge forums)

Gold farmers often make use of accounts stolen from their previous customers or by breaching security at third party websites and matching lists of usernames and passwords, and as with any big MMO launch, Final Fantasy XIV is already seeing a surge in stolen accounts. In a post on the FFXIV forums, Square has confirmed that a third party source is using a list of stolen accounts from an outside website in order to break into player accounts and use them for gold farming and chat spam.
Currently, we have confirmed that a third party is using account names and passwords, thought to be obtained from security breaches of other companys’ online services, in attempts to gain unauthorized access to Square Enix accounts. If you are using the same account name or password as your Square Enix account on other online services, there is a much greater chance that a security breach at any of the other online services could potentially lead to your Square Enix account being compromised.
Accounts suspected of being stolen will be restricted until the user can verify their ownership.
(Source: FFXIV)