Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Spyware

There's no "spyware" in Borderlands 4, Take-Two insist, following upset over terms of service
Game Updates

There’s no “spyware” in Borderlands 4, Take-Two insist, following upset over terms of service

by admin September 15, 2025


Gearbox and Take-Two Interactive’s Borderlands 4 has launched to cries of “pretty good” from (some) professional reviewers, and “Stutterland bugfest” from a vocal portion of the Steam playerbase. In amongst the complaints about performance, there are some fears about potential breaches of player privacy supposedly allowed for by Take-Two’s terms of service. A Borderlands developer has now responded to these fears in the Steam forums, reiterating that Take-Two at large aren’t in the business of “spyware”.

“Take-Two does not use spyware in its games,” reads the statement on Steam. “Take-Two’s Privacy Policy applies to all labels, studios, games, and services across all media and platform types such as console, PC, mobile app, and website. The Privacy Policy identifies the data activities that may be collected but this does not mean that every example is collected in each game or service.

“Take-Two identifies these practices in its Privacy Policy to provide transparency to players and comply with its legal obligations,” it goes on. “Take-Two collects this information to deliver its services to players, including to protect the game environment and player experience.”

The statement gives a couple of examples of more innocuous data collection, such as sponging up player and device identifiers to ensure compatibility with platforms, or making usernames visible to other players, together with more ambiguous practices like gathering data “to better understand how players play games”.

Take-Two have been caught deploying some pretty
insalubrious data collection software in the past. As reported by Alice O (RPS in peace) in 2018, Civilization 6 once made use of Red Shell software to track certain system data, in a bid to identify whether people who’ve clicked on adverts for games then proceed to buy them.

The Steam statement also seeks to clarify Take-Two’s policy towards mods, noting that they “prohibit mods that allow users to gain an unfair advantage, negatively impact the ability of other users to enjoy the game as intended, or allow users to gain access to content that the user is not entitled to”, but do not “generally” take action against mods “that are single-player only, non-commercial, and respect the intellectual property (IP) rights of [their] labels and third parties.” I’m not that familiar with the Borderlands modding scene, but Take-Two and subsidiary Rockstar Games have a legendarily iffy relationship with GTA modders.

As reported by Perignon Champagne Gamer, the concern about Take-Two spyware in Borderlands games dates back at least to May this year, when a Youtuber video about the publisher’s recently revised TOS sparked a short-lived uproar.

I do not want to hand over any of my data to any particular large corporation, myself, but I have to say, I don’t see anything in that TOS that strikes me as out of the ordinary, for better and worse. Suspicion is the appropriate response to such things, but exaggeration helps nobody. I’ve read a few comments that assume that Take-Two are automatically hoovering up everything mentioned in the list of possible data types collected, the second you boot up a game, rather than when you deliberately opt into certain services, such as Borderlands 4’s irritating SHiFT service for cross-play.

I am adding “interview somebody to do a proper explainer about data collection practices and privacy” to our endlessly extendable, usefully hypothetical Long Term Features trello. While we’re at it, we could look into related anxieties about anti-cheat and DRM, which have recently resurfaced thanks to Call Of Duty and Battlefield requiring that you enable secure boot on PC.

The TOS aside, some Borderlands 4 players are concerned about the game’s usage of two types of digital rights management – the infamous Denuvo software, which has been cited by a few of the reviews that mention launch performance problems, with proprietary Symbiote software stacked on top. We interviewed a Denuvo executive last year about their reputation for tanking games.

This article has been updated to mention Civilization 6’s use of Red Shell tracking software.



Source link

September 15, 2025 0 comments
0 FacebookTwitterPinterestEmail
Borderlands 4 Publisher Denies Rumors About Spyware In The Game
Game Updates

Borderlands 4 Publisher Denies Rumors About Spyware In The Game

by admin September 13, 2025



By the end of this weekend, Borderlands 4 is probably going to be one of the biggest launches of 2025. It hasn’t gone off without a hitch, however. The game has been hit hard by negative reviews on Steam over its PC optimization. Now, Borderlands 4 has been accused of including spyware by some vocal fans online. Those rumors have been so pervasive that Borderlands 4 publisher Take-Two Interactive has already shared a statement denying them.

The issue at hand involves the kernel-level anti-cheat in Borderlands 4, which some have accused of being modified to collect data about players. Borderlands 4’s updated terms of service was also presented as evidence that the game was being used to spy on players, hence the response from Take-Two.

“Take-Two does not use spyware in its games,” wrote a company spokesperson on Steam. “Take-Two’s Privacy Policy applies to all labels, studios, games, and services across all media and platform types such as console, PC, mobile app, and website. The Privacy Policy identifies the data activities that may be collected, but this does not mean that every example is collected in each game or service.”

The company acknowledges that it does collect information about users “to deliver its services to players,” including personalization and compatibility options. Take-Two’s position is that it discloses this info in the terms of service to be transparent with fans.

PC Gamer noted that the latest furor over spyware stemmed from “a misleading YouTube video prompting fans to play a game of telephone about the changes to the EULA over Reddit and forum threads, and a bout of short-lived Steam review bombing that hasn’t accomplished much of anything.”

Similar concerns about older games from the company surfaced earlier this summer, which essentially received the same response from Take-Two as the latest allegations. The company also asserted that its updated terms allow it to go after “abusive mods” that don’t respect the intellectual property of the company, while allowing single-player non-commercial mods to be distributed freely among fans.

Gearbox has shared links for optimizing NVIDIA card graphics settings and a PC troubleshooting guide for anyone having trouble running the game. Players who need some in-game help should check out GameSpot’s Borderlands 4 guide hub for tips and secrets.



Source link

September 13, 2025 0 comments
0 FacebookTwitterPinterestEmail
ICE Has Spyware Now | WIRED
Gaming Gear

ICE Has Spyware Now | WIRED

by admin September 8, 2025


The Biden administration considered spyware used to hack phones controversial enough that it was tightly restricted for US government use in an executive order signed in March 2024. In Trump’s no-holds-barred effort to empower his deportation force—already by far the most well-funded law enforcement agency in the US government—that’s about to change, and the result could be a powerful new form of domestic surveillance.

Multiple tech and security companies—including Cloudflare, Palo Alto Networks, Spycloud, and Zscaler—have confirmed customer information was stolen in a hack that originally targeted a chatbot system belonging to sales and revenue generation company Salesloft. The sprawling data theft started in August, but in recent days more companies have revealed they had customer information stolen.

Toward the end of August, Salesloft first confirmed it had discovered a “security issue” in its Drift application, an AI chatbot system that allows companies to track potential customers who engage with the chatbot. The company said the security issue is linked to Drift’s integration with Salesforce. Between August 8 and August 18, hackers used compromised OAuth tokens associated with Drift to steal data from accounts.

Google’s security researchers revealed the breach at the end of August. “The actor systematically exported large volumes of data from numerous corporate Salesforce instances,” Google wrote in a blog post, pointing out that the hackers were looking for passwords and other credentials contained in the data. More than 700 companies may have been impacted, with Google later saying it had seen Drift’s email integration being abused.

On August 28, Salesloft paused its Salesforce-Salesloft integration as it investigated the security issues; then on September 2 it said, “Drift will be temporarily taken offline in the very near future” so it can “build additional resiliency and security in the system.” It’s likely more companies impacted by the attack will notify customers in the coming days.

Obtaining intelligence on the internal workings of the Kim regime that has ruled North Korea for three generations has long presented a serious challenge for US intelligence agencies. This week, The New York Times revealed in a bombshell account of a highly classified incident how far the US military went in one effort to spy on the regime. In 2019, SEAL Team 6 was sent to carry out an amphibious mission to plant an electronic surveillance device on North Korean soil—only to fail and kill a boatful of North Koreans in the process. According to the Times’ account, the Navy SEALs got as far as swimming onto the shores of the country in mini-subs deployed from a nuclear submarine. But due to a lack of reconnaissance and the difficulty of surveilling the area, the special forces operators were confused by the appearance of a boat in the water, shot everyone aboard, and aborted their mission. The North Koreans in the boat, it turned out, were likely unwitting civilians diving for shellfish. The Trump administration, the Times reports, never informed leaders of congressional committees that oversee military and intelligence activities.

Phishing remains one of the oldest and most reliable ways for hackers to gain initial access to a target network. One study suggests a reason why: Training employees to detect and resist phishing attempts is surprisingly tough. In a study of 20,000 employees at the health care provider UC San Diego Health, simulated phishing attempts designed to train staff resulted in only a 1.7 percent decrease in the staff’s failure rate compared to staff who received no training at all. That’s likely because staff simply ignored or barely registered the training, the study found: In 75 percent of cases, the staff member who opened the training link spent less than a minute on the page. Staff who completed a training Q&A, by contrast, were 19 percent less likely to fail on subsequent phishing tests—still hardly a very reassuring level of protection. The lesson? Find ways to detect phishing that don’t require the victim to spot the fraud. As is often noted in the cybersecurity industry, humans are the weakest link in most organizations’ security—and they appear stubbornly determined to stay that way.

Online piracy is still big business—last year, people made more than 216 billion visits to piracy sites streaming movies, TV, and sports. This week, however, the largest illegal sports streaming platform, Streameast, was shut down following an investigation by anti-piracy industry group the Alliance for Creativity and Entertainment and authorities in Egypt. Before the takedown, Streameast operated a network of 80 domains that saw more than 1.6 billion visits per year. The piracy network streamed soccer games from England’s Premier League and other matches across Europe, plus NFL, NBA, NHL, and MLB matches. According to the The Athletic, two men in Egypt were allegedly arrested over copyright infringement charges, and authorities found links to a shell company allegedly used to launder around $6.2 million in advertising revenue over the past 15 years.



Source link

September 8, 2025 0 comments
0 FacebookTwitterPinterestEmail
Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn
Product Reviews

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

by admin September 3, 2025


Sextortion-based hacking, which hijacks a victim’s webcam or blackmails them with nudes they’re tricked or coerced into sharing, has long represented one of the most disturbing forms of cybercrime. Now one specimen of widely available spyware has turned that relatively manual crime into an automated feature, detecting when the user is browsing pornography on their PC, screenshotting it, and taking a candid photo of the victim through their webcam.

On Wednesday, researchers at security firm Proofpoint published their analysis of an open-source variant of “infostealer” malware known as Stealerium that the company has seen used in multiple cybercriminal campaigns since May of this year. The malware, like all infostealers, is designed to infect a target’s computer and automatically send a hacker a wide variety of stolen sensitive data, including banking information, usernames and passwords, and keys to victims’ crypto wallets. Stealerium, however, adds another, more humiliating form of espionage: It also monitors the victim’s browser for web addresses that include certain NSFW keywords, screenshots browser tabs that include those words, photographs the victim via their webcam while they’re watching those porn pages, and sends all the images to a hacker—who can then blackmail the victim with the threat of releasing them.

“When it comes to infostealers, they typically are looking for whatever they can grab,” says Selena Larson, one of the Proofpoint researchers who worked on the company’s analysis. “This adds another layer of privacy invasion and sensitive information that you definitely wouldn’t want in the hands of a particular hacker.”

“It’s gross,” Larson adds. “I hate it.”

Proofpoint dug into the features of Stealerium after finding the malware in tens of thousands of emails sent by two different hacker groups it tracks (both relatively small-scale cybercriminal operations), as well as a number of other email-based hacking campaigns. Stealerium, strangely, is distributed as a free, open source tool available on Github. The malware’s developer, who goes by the named witchfindertr and describes themselves as a “malware analyst” based in London, notes on the page that the program is for “educational purposes only.”

“How you use this program is your responsibility,” the page reads. “I will not be held accountable for any illegal activities. Nor do i give a shit how u use it.”

In the hacking campaigns Proofpoint analyzed, cybercriminals attempted to trick users into downloading and installing Stealerium as an attachment or a web link, luring victims with typical bait like a fake payment or invoice. The emails targeted victims inside companies in the hospitality industry, as well as in education and finance, though Proofpoint notes that users outside of companies were also likely targeted but wouldn’t be seen by its monitoring tools.

Once it’s installed, Stealerium is designed to steal a wide variety of data and send it to the hacker via services like Telegram, Discord, or the SMTP protocol in some variants of the spyware, all of which is relatively standard in infostealers. The researchers were more surprised to see the automated sextortion feature, which monitors browser URLs a list of pornography-related terms such as “sex” and “porn,” which can be customized by the hacker and trigger simultaneous image captures from the user’s webcam and browser. Proofpoint notes that it hasn’t identified any specific victims of that sextortion function, but the existence of the feature suggests it was likely used.



Source link

September 3, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (1,098)
  • Esports (800)
  • Game Reviews (772)
  • Game Updates (906)
  • GameFi Guides (1,058)
  • Gaming Gear (960)
  • NFT Gaming (1,079)
  • Product Reviews (960)

Recent Posts

  • This 5-Star Dell Laptop Bundle (64GB RAM, 2TB SSD) Sees 72% Cut, From Above MacBook Pricing to Practically a Steal
  • Blue Protocol: Star Resonance is finally out in the west and off to a strong start on Steam, but was the MMORPG worth the wait?
  • How to Unblock OpenAI’s Sora 2 If You’re Outside the US and Canada
  • Final Fantasy 7 Remake and Rebirth finally available as physical double pack on PS5
  • The 10 Most Valuable Cards

Recent Posts

  • This 5-Star Dell Laptop Bundle (64GB RAM, 2TB SSD) Sees 72% Cut, From Above MacBook Pricing to Practically a Steal

    October 10, 2025
  • Blue Protocol: Star Resonance is finally out in the west and off to a strong start on Steam, but was the MMORPG worth the wait?

    October 10, 2025
  • How to Unblock OpenAI’s Sora 2 If You’re Outside the US and Canada

    October 10, 2025
  • Final Fantasy 7 Remake and Rebirth finally available as physical double pack on PS5

    October 10, 2025
  • The 10 Most Valuable Cards

    October 10, 2025

Newsletter

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • This 5-Star Dell Laptop Bundle (64GB RAM, 2TB SSD) Sees 72% Cut, From Above MacBook Pricing to Practically a Steal

    October 10, 2025
  • Blue Protocol: Star Resonance is finally out in the west and off to a strong start on Steam, but was the MMORPG worth the wait?

    October 10, 2025

Newsletter

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close