EA Forums Online Security Newsletter - Volume 12
Welcome to the final edition of our newsletter dedicated to online safety in 2025!
As the year comes to a close, it’s a perfect time for reflection and a look back at what we’ve accomplished together. In this edition, we’re sharing a brief recap of the year, along with a short infographic highlighting key milestones from our newsletter journey. 🤗
Thanks to your continued engagement, we welcomed nearly 1,900 unique guests this year and awarded over 380 forum badges, an incredible achievement made possible by your participation and enthusiasm.🤩
We’d also like to extend a heartfelt thank-you to everyone who interacted with the newsletter, shared insights, and contributed valuable tips on staying safe online. Two blog posts created by our Super Users deserve special recognition. Be sure to check them out below:
- Asmodeus566's Players/Parents, video game control is in your hands. Account Security 101
- danisoff's Shared Devices - Shared Risk
To wrap up the year, we’ve included a concise summary of the topics covered throughout 2025, with links to each post. Whether you’re looking to refresh your memory or catch up on something you may have missed, this section is a great place to start. As always, commenting on a post or taking part in a quiz will earn you a unique forum badge.
Thank you for being part of our community. Most importantly, please stay safe online!
-
Volume 1 Safe Downloading Basics
- To download games and apps safely, use only official stores, check reviews and ratings, and be cautious with app permissions that seem unnecessary. Keep your device and apps updated, use antivirus software, and avoid illegal “cracked” versions, which often contain malware. Following these steps helps protect your device and personal data while enjoying your apps safely.
-
Volume 2 Essential Online Account Security
- Protect your online accounts by using strong, unique passwords stored in a password manager, enabling two-factor authentication for an extra layer of protection, and staying vigilant against phishing attempts. Secure your email with two-factor authentication (2FA), monitor account activity, and exercise caution with links, attachments, and requests for personal information, as email is often the gateway to other accounts. Together, these practices supported by industry partnerships like EA and Google help keep your digital identity safe.
-
Volume 3 Biometrics and Passkeys Explained
- Biometrics and passkeys are modern login methods that replace traditional passwords with secure, device-based authentication using biometric features, such as fingerprints or face recognition, or cryptographic keys. They offer stronger protection against phishing and brute-force attacks, while making sign-in faster and easier without extra verification steps. Biometric data is encrypted and stored only on your device, ensuring your personal information remains private and secure.
-
Volume 4 Safe and Secure Online Transactions
- Protect your online purchases by buying games and in-game currency only from official stores, publishers, or trusted sellers, and avoid deals that seem too good to be true. Strengthen your security by enabling Two-Factor Authentication, using protected payment methods like PayPal or Google Pay, and keeping your system up to date. Stay alert to social engineering by verifying links, emails, and support requests before taking action.
-
Volume 5 Why We Choose Weak Passwords and How to Improve
- Password creation is strongly influenced by human psychology, as people tend to favor familiar, emotionally meaningful, and easy-to-remember choices to reduce cognitive load and effort, often underestimating the risks associated with cyber threats. This leads to predictable and reused passwords that are easier to compromise, despite awareness of best practices. Using passphrases, mnemonics, password managers, and regularly updating passwords can strike a balance between security and usability, helping to overcome these psychological challenges.
-
Volume 6 How Phishing Exploits Human Psychology
- Phishing attacks exploit natural human instincts, such as urgency, trust in authority, curiosity, the desire for rewards, and social proof, to prompt people into acting without thinking. By triggering fear, excitement, or a sense of legitimacy, attackers bypass rational judgment and increase the chance of clicks or data sharing. Staying vigilant, pausing before reacting, and verifying messages through official channels are key to resisting these psychological tricks.
-
Volume 7 Understanding and Reporting Security Vulnerabilities
- A security vulnerability is a weakness in software or systems that attackers can exploit, which is different from in-game cheating that manipulates game mechanics rather than the underlying technology. EA provides a dedicated Security Vulnerability Submission process for responsibly reporting such issues, where reports are classified and assessed using industry-standard models, such as CVSS and STRIDE. Cheating and account-related issues must be reported through separate, appropriate EA channels.
-
Volume 8 Understanding Cloud Storage and Security
- Cloud storage means your data is kept on secure, global networks of servers instead of on a single personal device. Providers protect the infrastructure, while users remain responsible for securing their accounts and access. Major companies and services—including EA—rely on the cloud for storage, streaming, and gaming, making strong passwords and MFA/TFA (Multi-Factor Authentication/Two-Factor Authentication) essential. Using cloud backups wisely, such as following the 3-2-1 backup rule, helps keep your data and memories safe.
-
Volume 9 Cybersecurity Awareness Month: Staying Safe Online
- Cybersecurity Awareness Month highlights essential habits for staying safe online, including downloading games only from trusted sources and securing accounts with strong passwords, two-factor authentication (2FA), biometrics, and passkeys, as well as making safe online purchases and keeping systems up to date. It also explains how human psychology influences password choices and susceptibility to phishing, offering practical ways to slow down, verify, and think critically. Finally, it clarifies what security vulnerabilities are, how to report them responsibly to EA, and why proper reporting channels matter.
-
Volume 10 Privacy and Data Protection in Online Gaming
- Online gaming involves sharing personal data through gameplay, social features, and connected platforms, making privacy awareness and control essential. By understanding how data is collected and adjusting their privacy settings, players can reduce risks such as phishing or oversharing and better protect their digital identity. EA emphasizes privacy by design and provides tools in the EA Account to give players transparency, choice, and control over their data.
-
Volume 11 Strengthening Your Weakest Link
- Your digital life is an interconnected ecosystem, and attackers target the easiest entry point rather than the strongest defense. Small issues, such as reused passwords, outdated devices, or forgotten accounts, can become serious risks, especially during periods of increased online activity. By identifying weak spots and making simple improvements such as securing your email, enabling 2FA, updating devices, and reviewing accounts, you can significantly strengthen your overall security.
- How to keep your EA Account secure
- How to update your EA Account privacy settings
- Investing in Privacy and Security
- What is the cloud?
- Xbox - What's the difference between cloud gaming and remote play?
- EA Coordinated Vulnerability Disclosure Hall of Fame
- What to do if you find a vulnerability in an EA game or product
- Report cheating, harassment, and illegal content
- How to avoid phishing
- Where can I find my backup codes?
- How to update your EA Account
- Positive Play Charter
- How to update your EA Account