{"id":1866,"date":"2015-07-24T00:00:00","date_gmt":"2015-07-24T00:00:00","guid":{"rendered":"https:\/\/abes.org.br\/?p=1866"},"modified":"2015-07-24T00:00:00","modified_gmt":"2015-07-24T00:00:00","slug":"malwares-em-games-ameacam-jogadores","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/","title":{"rendered":"Game malware threatens gamers"},"content":{"rendered":"<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: center;\">\n\t<img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/anterior\/Imagens\/Games2.jpg\" style=\"width: 300px; height: 200px;\" \/><\/div>\n<div style=\"text-align: justify;\">\n\tThe fun of video games could be threatened by malware developed by cybercriminals, warns Trend Micro, which specializes in digital threat defense and security in the cloud age. Hackers are specializing in programs that modify game parameters in order to unfairly gain competitive advantage. Known as &quot;mods&quot;, these modifications allow, for example, that in shooting games it is possible to shoot with the greatest possible precision or that the player has unlimited life.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tOne of the worrying factors is that this mechanism encourages players, especially younger ones, to develop dishonest values and to demonstrate superiority, causing the spirit of competition and cooperation with other players to be undermined.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tBut it&#039;s not just that way that mods are frowned upon. The security of those who use them is seriously threatened by malware such as the keylogger, proven to be identified in the PC game Grand Theft Auto V. It records all keystrokes made on the system it is on and sends these records to its operator. Hence, the chances of sending victims&#039; online account login details are high, making them easy prey for a cybercriminal.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tHowever, one of the most effective \u201cbaits\u201d does not necessarily involve an infected mod. Cybercriminals are well known for tampering with popular search engine searches with results placed at the top of the page and redirecting users not only to phishing pages but also to survey scams and &quot;tool&quot; downloads that supposedly can modify the game, but they can also install malware to modify the victim&#039;s system or device.&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tHowever, there are also healthy communities of mods. They add more content to the video game and can even positively change the way they are played. A number of these fan-created mods turned into completely different games and became even more popular than the original in classics like Counter-strike, Defense of the Ancients, and DayZ. Some were even purchased and licensed, while others became prominent events in a series of international tournaments, such as the World Cyber Games.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tThe lesson that remains, according to Trend Micro, is that, downloaded with the intention of honestly stimulating fun, mods guarantee the user&#039;s fun. But to avoid risks, it is important for players to check community comments (there is usually a forum where players can read or submit reviews and feedbacks regarding other users) or review mods before installing them in order to ensure online safety.<\/div>\n<div>\n\t&nbsp;<\/div>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; A divers&atilde;o dos videogames pode estar amea&ccedil;ada por malwares desenvolvidos por cibercriminosos, alerta a Trend Micro, especializada na defesa de amea&ccedil;as digitais e seguran&ccedil;a na era da nuvem. Os hackers est&atilde;o se especializando em programas que modificam par&acirc;metros do jogo a fim de ganhar vantagem competitiva de maneira injusta. Conhecidos como &ldquo;mods&rdquo;, essas modifica&ccedil;&otilde;es [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-1866","post","type-post","status-publish","format-standard","hentry","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malwares em games amea\u00e7am jogadores - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malwares em games amea\u00e7am jogadores - ABES\" \/>\n<meta property=\"og:description\" content=\"&nbsp; A divers&atilde;o dos videogames pode estar amea&ccedil;ada por malwares desenvolvidos por cibercriminosos, alerta a Trend Micro, especializada na defesa de amea&ccedil;as digitais e seguran&ccedil;a na era da nuvem. Os hackers est&atilde;o se especializando em programas que modificam par&acirc;metros do jogo a fim de ganhar vantagem competitiva de maneira injusta. Conhecidos como &ldquo;mods&rdquo;, essas modifica&ccedil;&otilde;es [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"prima-dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"prima-dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/\"},\"author\":{\"name\":\"prima-dev\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\"},\"headline\":\"Malwares em games amea\u00e7am jogadores\",\"datePublished\":\"2015-07-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"articleSection\":[\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/\",\"name\":\"Malwares em games amea\u00e7am jogadores - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2015-07-24T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/malwares-em-games-ameacam-jogadores\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malwares em games amea\u00e7am jogadores\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\",\"name\":\"prima-dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"caption\":\"prima-dev\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/prima-dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malwares em games amea\u00e7am jogadores - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/","og_locale":"en_US","og_type":"article","og_title":"Malwares em games amea\u00e7am jogadores - ABES","og_description":"&nbsp; A divers&atilde;o dos videogames pode estar amea&ccedil;ada por malwares desenvolvidos por cibercriminosos, alerta a Trend Micro, especializada na defesa de amea&ccedil;as digitais e seguran&ccedil;a na era da nuvem. Os hackers est&atilde;o se especializando em programas que modificam par&acirc;metros do jogo a fim de ganhar vantagem competitiva de maneira injusta. Conhecidos como &ldquo;mods&rdquo;, essas modifica&ccedil;&otilde;es [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2015-07-24T00:00:00+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"prima-dev","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"prima-dev","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/"},"author":{"name":"prima-dev","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e"},"headline":"Malwares em games amea\u00e7am jogadores","datePublished":"2015-07-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/"},"wordCount":560,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"articleSection":["\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/","url":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/","name":"Malwares em games amea\u00e7am jogadores - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2015-07-24T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/en\/malwares-em-games-ameacam-jogadores\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Malwares em games amea\u00e7am jogadores"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e","name":"prima-dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","caption":"prima-dev"},"url":"https:\/\/abes.org.br\/en\/author\/prima-dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 16:40:56","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/1866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=1866"}],"version-history":[{"count":0,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/1866\/revisions"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=1866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=1866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=1866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}