Riot Games Hacked: What You Need to Know

Riot Games, the company responsible for the popular video game League of Legends, has been hacked. This attack is the latest example of cyber-crime hitting the gaming industry, putting user data and information at risk. In this article, we’ll explore the Riot Games hack, what it means for users, and how you can protect yourself against the threat of cybercrime. Riot Games is one of the leading video game developers, responsible for the popular MOBA League of Legends. In late November 2020, the company revealed that it had been the target of a cyberattack. During the attack, the hackers were able to gain access to user data, which included some user account information, as well as other data such as email addresses and encrypted passwords. Fortunately, the hackers did not gain access to banking information or any other sensitive information, and the company has assured players that no financial information was compromised. However, the company has urged users to take immediate action to protect their accounts and information, lest they become the target of further malicious activity. This attack on Riot Games is yet another example of the growing threat of cybercrime. Cyberattacks have become increasingly common in recent years, as hackers become more adept at exploiting vulnerabilities in computer systems. This raises the importance of ensuring that your online accounts are well protected. There are a number of measures that can be taken to protect yourself against the threat of cybercrime. The first is to ensure that all of your passwords are strong and unique. Every account should have a different password, and it should not be something easy to guess. It should be at least 8 characters in length, and it should have a combination of uppercase, lowercase, numbers and symbols. In addition, it’s important to make sure that your software is up to date. This includes both your operating system and any additional software that you have installed. An outdated system can be a major vulnerability, as it can leave you open to attacks from hackers. You should also consider installing an antivirus program, which can guard against malicious software that can be used to gain access to your accounts. Finally, it’s important to be aware of phishing scams. Phishing scammers attempt to trick you into giving away personal information, such as your passwords or bank details. Be wary of any emails, messages or social media messages asking for this information, as they are often attempts to steal your identity. The Riot Games hack is yet another reminder of the importance of online security. To ensure that your information is safe, it’s important to take the necessary steps to protect yourself against cybercrime. Make sure your passwords are secure and unique, keep your software up to date, install an antivirus program, and be aware of phishing scams. Taking these steps can help keep yourself and your accounts safe.

This Cyber News was published on securityaffairs.com. Publication date: Thu, 26 Jan 2023 10:39:02 +0000


Cyber News related to Riot Games Hacked: What You Need to Know

5 Valuable Skills Kids Can Gain by Playing Video Games - Video games come in all shapes and sizes and can be very educational for children of all ages. Video games can provide children with valuable skills that can help them in their everyday lives. From problem-solving abilities to self-control, learning ...
1 year ago Welivesecurity.com
Riot Games Receives a 10 Million Dollar Ransom Demand - What Happened and How Can You Protect Your Organization? - Riot Games, the developer behind the popular video games League of Legends and Valorant, recently received a 10 million dollar ransom demand. This demand has the potential to cause chaos across the gaming world and can put any organization at risk if ...
1 year ago Heimdalsecurity.com
Riot Games Refuses to Give in to Hackers' Ransom Demand - Gaming giant Riot Games recently experienced what it calls a “security incident” in which hackers demanded a ransom in exchange for the release of its data. Riot refused to pay and took measures to protect its employees and customers. The company ...
1 year ago Bleepingcomputer.com
Riot Games Hacked: What You Need to Know - Riot Games, the company responsible for the popular video game League of Legends, has been hacked. This attack is the latest example of cyber-crime hitting the gaming industry, putting user data and information at risk. In this article, we’ll ...
1 year ago Securityaffairs.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
2 months ago Aws.amazon.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
Here's How to Make Your Gaming Experience Safer - Over 1 billion people worldwide regularly play online games. The emergence of high-quality games, multiple gaming mediums, and online communities has prompted gamers to overlook the dark side of online gaming. If you play games online on your ...
1 year ago Cybersecurity-insiders.com
Riot Games Hacked: Delays Game Patches After Security Breach - Riot Games, the developer behind League Of Legends, recently suffered from a security breach, leading to the delays in game patches. ...
1 year ago Bleepingcomputer.com
Riot Games Receives Ransom Email After Social Engineering Attack - Riot Games recently found itself as victim of a sophisticated attack by an advanced cybercriminal. Following a social engineering attack, the online video game company received an email threatening to release the stolen source code if a ransom wasn't ...
1 year ago Therecord.media
Fragging: The Subscription Model Comes for Gamers - The video game industry is undergoing the same concerning changes we've seen before with film and TV, and it underscores the need for meaningful digital ownership. Twenty years ago you owned DVDs. Ten years ago you probably had a Netflix subscription ...
10 months ago Eff.org
Exploring the SIEM Environment Identifying and Overcoming Vendor Tricks - Are you fed up with the never-ending games and deceptive tactics used by security information and event management vendors? It's time to take control and make informed decisions. That's why we have decided to launch a series of blog posts to help ...
1 year ago Exabeam.com
Riot Games Pauses Updates After Social Engineering Attack - Riot Games, the creators of the popular game League of Legends, recently announced that they will be pausing their updates after suffering from a social engineering attack. According to their statement, the company was targeted by an adversary who ...
1 year ago Therecord.media
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
1 year ago Esecurityplanet.com
Insomniac hack files leak news on Wolverine, Spider-Man 3, and more - Oli Welsh is senior editor, U.K., providing news, analysis, and criticism of film, TV, and games. He has been covering the business & culture of video games for two decades. The ransomware group that hacked Spider-Man 2 developer Insomniac Games on ...
1 year ago Polygon.com
CVE-2020-1627 - A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the ...
3 years ago
VMware vCenter RCE Vulnerability: What You Need to Know - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 months ago Securityboulevard.com
Should I get CISSP Certified? - CISSP's reputation as a certification is for being 'a mile wide and an inch deep'. That's a limitation too - CISSP means you understand something, but not that you know how to do it. But the exam is a six-hour marathon consisting of a vast array of ...
10 months ago Securityboulevard.com
5 Types of Crypto You Didn't Know Existed - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
9 months ago Hackread.com
Spider-Man 2 Developer Insomniac Games Hit by Rhysida Ransomware - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
4 Best War Games You Should Play - Online gaming is a luxury, especially if you are interested in strategic war games. Let this format be better expressed within the framework of games and films and people will perceive it at the multimedia level, and not take part in real combat ...
1 year ago Hackread.com
Lee County student Chromebooks hacked in 'Cyber Monday prank' - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Nbc-2.com
Russian APT29 Hacked US Biomedical Giant in TeamCity-Linked Breach - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
X Account of Google Cybersecurity Firm Mandiant Hacked in Crypto Scam - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
11 months ago Hackread.com
Beirut Airport Screens Hacked with Anti-Hezbollah Message - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
11 months ago Hackread.com
SEC X Account Hacked, Tweets Fake News About Bitcoin ETFs - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
11 months ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)