A new cybersecurity report shoed that identity spoofing – done with stolen identity data – represents now the hacker’s top pick then they launch an attack on the gaming and gambling industry.
Along with the identity spoofing, location spoofing became the fastest growing attack vector in the cyberspace, increasing with 257% year-after-year. Responsible for this is the more and more sophisticated location spoofing tools, which hackers choose to use in an attempt to disguise their true location, to launder money for example. Cyberspace has become a war-theatre from collusive play and self-excluders to malicious account takeovers (ATOs), everything is permitted. Because of this operators must always be able to differentiate trusted users from fraudsters.
Remember everything can be hacked. In order to stay away from any threats related to the cyber world, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running. If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;
Now there are more than two billion gamers worldwide, nearly 60 percent of the industry’s traffic is cross-border. Operators must keep the peace with the rapidly evolving regulatory landscape and stringent new anti-money laundering laws. In order to do this, they need to make the verification of the true location of a transacting gamer as good and as secure as possible.
Mobile transactions also continue to rise, more and more people are using smartphones to place bets and access accounts: 71% of all gaming and gambling transactions are now made via mobile devices, the growth is phenomenal with a 45% increase year-after-year. Because of this hackers are seeing mobile as a key opportunity to monetize stolen credentials; nowadays mobile payments are heavily attacked than ever before.
Gaming and gambling operators must incorporate dynamic digital identity intelligence, true geo-location, online identity credentials, and threat analysis if they want to better reduce the risks. The key here is to be able to effectively differentiate trusted users from hackers.
We would continue to monitor this cybersecurity problem. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.