{"id":16763,"date":"2020-05-02T19:41:55","date_gmt":"2020-05-02T14:11:55","guid":{"rendered":"https:\/\/www.techjockey.com\/blog\/?p=16763"},"modified":"2026-03-30T18:49:57","modified_gmt":"2026-03-30T13:19:57","slug":"online-gamers-beware","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware","title":{"rendered":"Online Gamers Beware: Hackers are Coming for Your Device"},"content":{"rendered":"\n<p>Online gaming is an avenue to learn new games, socially interact and spend time in doing something more fun. The number has further increased due to stay at home situation during the current lockdown situation due to COVID 19. The number of online gamers in India during the lockdown has increased by 12 percent, as per the reports by All India Gaming Federation (AIGF).<\/p>\n\n\n\n<p>This experience however comes with its fair share of security hiccups,\nmaking one more attentive in using this platform. Around 35.92 percent of the\ntotal <a class=\"wpil_keyword_link\" href=\"https:\/\/www.techjockey.com\/blog\/ddos-attacks-on-smes\"   title=\"DDoS attacks\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"2240\">DDoS attacks<\/a> was witnessed by the gaming industry in 2019! <\/p>\n\n\n\n<p>The statistics become even grim for women players where around thirty percent of women have filed complaints related to verbal abuse and inappropriate messaging. It\u2019s high time that the global gaming market takes this seriously and ensures secure games and safe gaming experience for online gamers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-gamers-vs-hackers-common-online-threats-for-gamers\"><span class=\"ez-toc-section\" id=\"gamers_vs_hackers_common_online_threats_for_gamers\"><\/span>Gamers Vs Hackers: Common Online Threats for Gamers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The gaming market is a lucrative business where the number of online gamers is on the rise. Gaming industry recently&nbsp;generated a revenue of approx. 130 billion dollars worldwide. This however does not make it immune from cyber threats that threaten to undermine the working of the entire video game industry. Most of the <a href=\"https:\/\/www.techjockey.com\/blog\/cyber-security-threat\">common cyber threats<\/a> for online gamers are:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/gamers-vs-hackers.png\" alt=\"gaming market\" class=\"wp-image-16764\"\/><\/figure><\/div>\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"phishing\"><\/span>Phishing<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p><a class=\"wpil_keyword_link\" href=\"https:\/\/www.techjockey.com\/blog\/what-is-phishing\"   title=\"Phishing\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"2007\">Phishing<\/a> links are usually in the form of email or text messages\nthat request online gamers to validate bank accounts and change passwords.\nPhishing activities involve hacking a gamer&#8217;s bank details, account numbers,\npasswords and other sensitive information for reselling it in black market. A\npopular online game (Steam) faced the phishing attack through a fake game\nscreen saver aside from fake games.<\/p>\n\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"malware\"><\/span>Malware<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p>Malware and malicious spyware are installed through requests\nthat popup on your gaming screen for installing updates or any other key\ninformation. It happened with FIFA 16 where players were fooled through a Media\nfire download link to install coin miner.&nbsp;<\/p>\n\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"trolls_bullying\"><\/span>Trolls &amp; Bullying<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p>Paid or free games websites witness all kinds of gamers on an\neveryday basis. While chatting during gaming is normal, what is not normal is\nwhen such chats become personal and insulting. Bullying, humiliating, using\nabusive emojis, etc. are some of its examples.<\/p>\n\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"identity_theft\"><\/span>Identity Theft<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p>Hackers mostly target gamers who have paid for video games software. Password and credit card details stealing, malware, scamming are the main tactics used by online criminals to hijack your identity. It is for this reason that the cloud gaming market request users to create stronger passwords and undergo two-factor authentications.&nbsp;<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\"><strong>Related Categories: <a href=\"https:\/\/www.techjockey.com\/category\/game-development-software\">Game Development Software<\/a> | <a href=\"https:\/\/www.techjockey.com\/category\/app-development-software\">App Development Software<\/a> | <a href=\"https:\/\/www.techjockey.com\/category\/website-development-tools\">Website Development Tools<\/a><\/strong><\/p>\n\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"device_compromise\"><\/span>Device Compromise<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p>A strong internet suite is advised because stealers indulge in compromising the security of your device through promises of quick updates, tools to enhance gaming experience, etc. A device is often connected to botnets and mines Bitcoin for stealing identity\/data.<\/p>\n\n\n\n<p>Teslacrypt is one good example of device compromise, as it was created for encrypting online gamers\u2019 information on their device and hoaxing them to pay money for decrypting these files.<\/p>\n\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"password_stealers\"><\/span>Password Stealers<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p>Password is stolen through malicious codes that completely block\nyour access to the game. This happened recently with a very popular&nbsp;online\ngame (Steam) where players were asked to submit personal and banking details to\ncontinue playing the game.&nbsp;<\/p>\n\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"power-up_lures\"><\/span>Power-Up Lures<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p>This trend may sound new, but it is not actually. Similar to phishing, here also hackers make an attempt at compromising your account by providing fake offers.<\/p>\n\n\n\n<p>The compromise is usually made by identifying an error in <a href=\"https:\/\/www.techjockey.com\/blog\/ai-tools-for-coding\">coding that may exist in the server to rob players who may not be tech savvy or new to online<\/a> games. Then there are also attempts of luring gamers with&nbsp;offers such as a foreign trip, lottery money&nbsp;and even free gifts.&nbsp;<\/p>\n\n\n\n<ul>\n<li><h3 style=\"font-size:22px;\"><span class=\"ez-toc-section\" id=\"mal_advertising\"><\/span>Mal advertising<span class=\"ez-toc-section-end\"><\/span><\/h3><\/li>\n<\/ul>\n\n\n\n<p>Mal advertising is done through fake apps to launch an attack on gaming devices. <a class=\"wpil_keyword_link\" href=\"https:\/\/www.techjockey.com\/blog\/android-trojan\"   title=\"Android Trojan\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"2257\">Android Trojan<\/a> is a popular case of mal advertising. Trojan would display ads on games that it had duplicated from the original ones.<\/p>\n\n\n\n<p>Once this adware enters into a computer system, it slows down the processing units to such an extent that several rebooting attempts also fail to rectify the error. The information that this adware collects from a system is often sold to third parties.<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\"><strong>Suggested Read:<\/strong> <a href=\"https:\/\/www.techjockey.com\/blog\/best-streaming-services\">Looking for Netflix Alternatives?<\/a><\/p>\n\n\n\n<p><strong style=\"font-size:24px;\">How Gaming Industry Can Ensure Security Controls<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/how-gaming-industry.png\" alt=\"Free games\" class=\"wp-image-16766\"\/><\/figure><\/div>\n\n\n<p>Gaming market needs to ensure security, confidentiality and\nintegrity of its games to offer a more secured user experience. Most of the\nbiggest gaming companies deploy the following measures for a safe gaming\nexperience:&nbsp;<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Adopting Better Security\nFeatures<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Gaming industry should adopt better security measures for\nenriching user experience. Cyclical software update, online key validation,\nencrypted memory\/storage and secured booting are immediate steps for boosting\nsecurity of online and global gaming arena.<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Preventing Software\nVulnerabilities<\/strong><\/li>\n<\/ul>\n\n\n\n<p>TPM (trusted platform modules) are efficient ways for ensuring\nthat video games software is not vulnerable to attacks. TPM helps in storing\ncrypto keys that identify both vendor&#8217;s public key and an individual device.<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Maintain Confidentiality\nof Databases<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Gaming industry follows certain guidelines for maintaining the confidentiality of database. Some such measures are managing data access, safe disposal of records\/data, management of data acquisition\/ utilisation and lastly encryption of the files.<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Prevent In-Game Phishing<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Phishing is quite a threat to security. It can however be prevented through use of spam filters, latest security patches, web filters and encryption of company&#8217;s sensitive information.&nbsp;<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\"><strong>Suggested Read:<\/strong> <a href=\"https:\/\/www.techjockey.com\/blog\/free-gaming-apps-to-download\">Quarantine Games: 21 Free Gaming Apps to Download During the Lockdown<\/a><\/p>\n\n\n\n<p><strong style=\"font-size:24px;\">How Gamers Can Combat Security Threats for Uninterrupted Gaming Experience<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/how-gamers-can-combat-securities.png\" alt=\"huge market for online gamers\" class=\"wp-image-16765\"\/><\/figure><\/div>\n\n\n<p>Gaming industry is a huge market for online gamers. Security\nrisks and information challenges are the major risks that it suffers from. As a\ngamer, you can combat security issues by keeping the following measures in\nmind:<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Multi-Factor\nAuthentication<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Multi factor authentication makes sure that even if your\npassword is lost, another authentication step can be taken to retrieve account.\nRemember, Indian video games companies or non-Indian ones, none of these ever\nask for password details from its online gamers.<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Changing Passwords\nRegularly<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Strong password, which is also changed regularly is the key to\nprotecting the gaming account. Cloud gaming market has in today&#8217;s times made\nthe entire password changing experience hassle free by linking the gaming\ndevice with multiple communication channels such as mobile phone number and\nemail addresses.&nbsp;<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Phishing Awareness &amp;\nPrevention<\/strong><\/li>\n<\/ul>\n\n\n\n<p>As a gamer, it is important that you be aware of what kinds of\nmessages and attachments fall under the phishing categories. Requests demanding\nbrowser updates, account details, passwords and personal details are all\nphishing attempts by hackers. Half the battle is already won if you are aware\nof how phishing scams are being used. As a precautionary measure use only\nupdated versions of online games, as they do away with the security lags that\nwere present in the previous versions.<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Malware Protection<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Identify if there are any recent changes in your mobile device such as quick draining of battery, slow performance or heating issues even when the device isn&#8217;t in use. It might be a case of malware. Be careful of such malware signs and immediately reconfigure or reformat your device. to remove suspicious spyware or malware.<\/p>\n\n\n\n<ul>\n<li><strong style=\"font-size:22px;\">Installing Antivirus on\nTheir Device<\/strong><\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.techjockey.com\/category\/antivirus-software\">Antivirus solutions<\/a> are critical tools for online gamers to enjoy their popular games while they are homebound or free to move around. End users should avoid requests from senders that ask for disabling the antivirus to avail lucrative offers. In fact, to maximise the efficiency of antivirus software, biggest gaming companies have built <a href=\"https:\/\/www.techjockey.com\/category\/network-security-solution\">specific network security<\/a> features for online games.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-list-of-the-best-20-antivirus-software-amp-apps-for-2020\"><strong>List of the <a href=\"https:\/\/www.techjockey.com\/blog\/best-antivirus-software-solutions-2019\">Best 20 Antivirus Software &amp; Apps for 2020<\/a><\/strong><\/h4>\n\n\n\n<ul>\n<li>Avast Mobile Security &#8211; Free<\/li>\n\n\n\n<li>Bitdefender Total Security &#8211; Free<\/li>\n\n\n\n<li>AVG &#8211; Free<\/li>\n\n\n\n<li>Kaspersky &#8211; Free<\/li>\n\n\n\n<li>Microsoft Windows Defender &#8211; Free<\/li>\n\n\n\n<li>Norton Security and Antivirus<\/li>\n\n\n\n<li>Aviras Antivirus Security<\/li>\n\n\n\n<li>Symantec Endpoint Protection 14<\/li>\n\n\n\n<li>VirusTotal<\/li>\n\n\n\n<li>Panda Dome<\/li>\n\n\n\n<li>Webroot<\/li>\n\n\n\n<li>BullGuard Antivirus<\/li>\n\n\n\n<li>ESET Endpoint Security<\/li>\n\n\n\n<li>Total Defense Antivirus<\/li>\n\n\n\n<li>F-Secure SAFE<\/li>\n\n\n\n<li>Trend Micro Antivirus+ Security<\/li>\n\n\n\n<li>Cylance Smart Antivirus<\/li>\n\n\n\n<li>Emsisoft Anti Malware<\/li>\n\n\n\n<li>Sophos Home<\/li>\n\n\n\n<li>Adaware Antivirus Free<\/li>\n<\/ul>\n\n\n\n<p><strong style=\"font-size:24px;\">Summary<\/strong><\/p>\n\n\n\n<p>Disclosure and cyberattacks are key security issues being faced by gaming industry. However, the video game development stage today has reached a point where cyber security is the prime concern for all including Indian video games companies. The cloud gaming market is working hard to ensure a reliable user experience and network security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online gaming is an avenue to learn new games, socially interact and spend time in doing something more fun. The number has further increased due to stay at home situation during the current lockdown situation due to COVID 19. The number of online gamers in India during the lockdown has increased by 12 percent, as [&hellip;]<\/p>\n","protected":false},"author":64,"featured_media":16769,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7684,1697],"tags":[7733,7735,7732,7734],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online Gamers Beware: Hackers are Coming for Your Device<\/title>\n<meta name=\"description\" content=\"Cyber security is major concern for cloud gaming market today. Find out what steps can be taken by online gamers &amp; gaming industry to prevent cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/16763\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Gamers Beware: Hackers are Coming for Your Device\" \/>\n<meta property=\"og:description\" content=\"Cyber security is major concern for cloud gaming market today. Find out what steps can be taken by online gamers &amp; gaming industry to prevent cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/16763\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-02T14:11:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:19:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/Online-Gamers-Beware-Hackers-are-Coming-for-Your-Device_banner_1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Somya Gupta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Somya Gupta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Online Gamers Beware: Hackers are Coming for Your Device","description":"Cyber security is major concern for cloud gaming market today. Find out what steps can be taken by online gamers & gaming industry to prevent cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/16763","og_locale":"en_US","og_type":"article","og_title":"Online Gamers Beware: Hackers are Coming for Your Device","og_description":"Cyber security is major concern for cloud gaming market today. Find out what steps can be taken by online gamers & gaming industry to prevent cyberattacks.","og_url":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/16763","og_site_name":"Techjockey.com Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2020-05-02T14:11:55+00:00","article_modified_time":"2026-03-30T13:19:57+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/Online-Gamers-Beware-Hackers-are-Coming-for-Your-Device_banner_1.png","type":"image\/png"}],"author":"Somya Gupta","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Somya Gupta","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware"},"author":{"name":"Somya Gupta","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/3ab2d884a94f33b3c2e787991848ffc6"},"headline":"Online Gamers Beware: Hackers are Coming for Your Device","datePublished":"2020-05-02T14:11:55+00:00","dateModified":"2026-03-30T13:19:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware"},"wordCount":1396,"publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/Online-Gamers-Beware-Hackers-are-Coming-for-Your-Device_banner_1.png","keywords":["Free games","Gaming industry","Online Gamers","online gaming"],"articleSection":["Business Software During COVID-19","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware","url":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware","name":"Online Gamers Beware: Hackers are Coming for Your Device","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/Online-Gamers-Beware-Hackers-are-Coming-for-Your-Device_banner_1.png","datePublished":"2020-05-02T14:11:55+00:00","dateModified":"2026-03-30T13:19:57+00:00","description":"Cyber security is major concern for cloud gaming market today. Find out what steps can be taken by online gamers & gaming industry to prevent cyberattacks.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/blog\/online-gamers-beware"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware#primaryimage","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/Online-Gamers-Beware-Hackers-are-Coming-for-Your-Device_banner_1.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2020\/05\/Online-Gamers-Beware-Hackers-are-Coming-for-Your-Device_banner_1.png","width":1200,"height":628,"caption":"Online Gamers Beware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/blog\/online-gamers-beware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business Software During COVID-19","item":"https:\/\/www.techjockey.com\/blog\/category\/software-helps-business-during-covid-19"},{"@type":"ListItem","position":3,"name":"Online Gamers Beware: Hackers are Coming for Your Device"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/blog\/#website","url":"https:\/\/www.techjockey.com\/blog\/","name":"Techjockey.com Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","width":72,"height":72,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/twitter.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/3ab2d884a94f33b3c2e787991848ffc6","name":"Somya Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43dd79b7e96cd1f7c4b59e619fe31bcd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43dd79b7e96cd1f7c4b59e619fe31bcd?s=96&d=mm&r=g","caption":"Somya Gupta"},"description":"Somya is one of the most experienced technical writers in the team who seems to be comfortable with all types of business technologies. She is a sensitive writer who ensures that businesses are able to find the right technologies through her writings. She would leave no stones unturned in making business professionals, even with minimal technical expertise understand the power of automation.","sameAs":["https:\/\/www.techjockey.com\/","https:\/\/www.linkedin.com\/in\/somya-gupta-95b3b5170"],"gender":"Female","jobTitle":"Content Writer","worksFor":"Techjockey Infotech Pvt. Ltd.","url":"https:\/\/www.techjockey.com\/blog\/author\/somy"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/16763"}],"collection":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/comments?post=16763"}],"version-history":[{"count":7,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/16763\/revisions"}],"predecessor-version":[{"id":63135,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/16763\/revisions\/63135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media\/16769"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media?parent=16763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/categories?post=16763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/tags?post=16763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}