<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hijack &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/hijack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Wed, 26 Jun 2019 15:14:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>hijack &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>EA patched Origin security flaws that put millions of users at risk</title>
		<link>https://www.efrtechgroup.com/tech/ea-patched-origin-security-flaws-that-put-millions-of-users-at-risk/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Wed, 26 Jun 2019 15:14:00 +0000</pubDate>
				<category><![CDATA[check point research]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[cyberint]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ea]]></category>
		<category><![CDATA[ea games]]></category>
		<category><![CDATA[flaw]]></category>
		<category><![CDATA[Gaming]]></category>
		<category><![CDATA[hijack]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[origin]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/ea-patched-origin-security-flaws-that-put-millions-of-users-at-risk/</guid>

					<description><![CDATA[[ad_1] The vulnerabilities took advantage of abandoned subdomains, EA Games&#8217; use of authentication tokens and single sign-on and TRUST mechanisms built into the user login process. Had an attack been carried out, it could have been devastating, given that EA is the world&#8217;s second largest gaming company and millions of user accounts would have been [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>The vulnerabilities took advantage of abandoned subdomains, EA Games&#8217; use of authentication tokens and single sign-on and TRUST mechanisms built into the user login process. Had an attack been carried out, it could have been devastating, given that EA is the world&#8217;s second largest gaming company and millions of user accounts would have been at risk.</p>
<p>The vulnerabilities are a reminder of how susceptible online and cloud platforms are to breaches. &#8220;These platforms are being increasingly targeted by hackers because of [the] huge amounts of sensitive customer data they hold,&#8221; said Check Point&#8217;s Oded Vanunu. Check Point and CyberInt advise gamers to enable <a href="https://www.engadget.com/2019/04/18/epic-games-two-factor-sms-email-verification/">two-factor authentication</a> and only use official websites to download or purchase games. The companies also caution that <a href="https://www.engadget.com/2017/11/27/epic-battle-royale-cheating-lawsuit/">parents</a> should warn children about the threat of online fraud.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/06/26/ea-games-origin-security-vulnerabilities/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
