Connect with us


One in ten Gamers has had Their Online Identity Stolen



One in ten gamers has had their online identity stolen

Μore than one in ten gamers (12%, or about 179 million worldwide) have fallen victim to the theft of their ID – the value of which could reach $347 billion worldwide, according to a global survey by Kaspersky.

The new survey was commissioned by Kaspersky and conducted by Savanta in November 2020, to examine the state of global gaming in 2020. According to 5,031 gamers surveyed in 17 countries, almost one-fifth (19%) also have been bullied during a game. This worrying trend is even more prevalent in Russia (44%), Saudi Arabia (27%), Turkey (28%), and the USA (27%). Worse, one in three (33%) gamers suffered from cheaters. All this results in stress and anxiety for 31%. This is frustrating as stress relief is what most of them (62%) seek in the game, as well as emotions (62%) and then friendship (46%).

Kaspersky offers seven ways to be as safe as possible while playing online:

1. Purchase from official sources

Always buy PC games either from well-known platforms such as Steam and GOG, or from official developer sites.

2. Save wisely

Official stores often offer significant discounts or even free games. However, many email offers can be a scam – go to the developer or store website to see if the discount is listed there – if not; it is not real.

3. Check the return policy

Before you buy, find out the store rules for returning a game that you do not like or do not work on your computer.

4. Use a special card for online shopping

Instead of linking a card to all your savings, get a debit card for online shopping and top it up as needed. That way, if intruders enter a site you are using, they will not gain much.

5. Use a secure connection

We recommend connecting to online stores only from home – having your home network properly secured.

6. Protect your accounts

Protect your Steam and, your online casino account, and any social media profiles you use to connect to game stores (but do not use social media accounts to connect elsewhere if you can avoid it).

7. Protect your devices

The computers, smartphones, and tablets you use for gaming also need protection. Use trusted solutions to block fake websites and malware, to provide security alerts, and, contrary to misconception, this does not corrupt the game. The Gaming Mode that you will find in modern security solutions is activated automatically when you play in full-screen mode.

With the advent of COVID-19, new needs were created for the easier operation of tasks, courses, but also for communication. Thus, Zoom gained a large audience, as it offers unique features such as screen sharing, multi-user participation in a video call, group messaging, and mobile collaboration. Also, it was used a lot and facilitated the interview part. These new features were a form of evolution in the field of video conferencing and led to massive popularity. This mass use turned the attention of criminals to Zoom, increasing cyber-attacks.


One of Zoom’s known attacks is zoombombing, which looks more like a hoax and does not cause huge damage to cyberspace, as it is not related to virus spread or malware. Coordinated attempts are made to raid Zoom sessions by harassing and causing chaos.

How to protect yourself?

Pay attention to the links

When you start a video conference, you use a link to send it to the participating people. Many times, this can lead to malware through the link. It is best for all of you to send them an ID and password for the zoom window.

Set up who you can share your screen with

To prevent anyone from interfering with your video conferencing, you need to make sure that no one can share your screen. There is the option to share the screen and the advanced settings in the general settings window, where you can only select the host to share the screen.

Use the waiting rooms

It is one of Zoom’s most hidden security features that lets you wait before the meeting starts. To find it, you have to go to your account and then to the settings, then to the discussions, and find the waiting rooms known as waiting rooms. This will allow you to control your video conferencing before anyone else enters.

I prefer to create a webinar rather than a meeting

If the webinar does not require participation, there is less chance of someone hacking it. Of course, it is only available to users who have paid.

Finally, remember that everything is recorded, and you should not write something that you would not want your mother or your boss to see.