EA Forums Online Security Newsletter - Volume 10
Happy Halloween 🎃! Trick or Treat Night marks the last day of the month, and it’s also the day we publish our monthly newsletter. Before we dive into this month’s topic, let’s take a quick look back at our previous edition, which was a collection of online security tips from past issues, all tied to Cybersecurity Awareness Month in October. Speaking of this special month for cybersecurity, have you shared any security tips with your friends or family? Have they shared their experiences with you, or have you come across an interesting article related to cybersecurity? If so, please share them with us in the comments to help spread awareness! This month’s security focus is Privacy & Data Protection in Online Games. As usual, we’ll share valuable insights around this topic and encourage you to join the discussion. Every participant, whether by joining the conversation or completing this month’s quiz, will receive a unique token of participation in the form of a forum badge! Stay safe! Privacy & Data Protection in Online Games Let’s Talk Privacy First Gaming is all about fun, but when you’re online, your data becomes part of the game too. Every time you log in, chat with friends, or complete a match, you’re leaving traces of personal information. That’s why knowing what’s collected, how it’s used, and what you can control matters. Good data protection isn’t just a checkbox; it’s about building a foundation: limiting what’s collected, securing it properly, and giving you meaningful control over your profile. When developers bake “privacy-by-design” into games, everyone wins. Why Your Gaming Data Matters In modern titles, you don’t just play, you participate. Achievements, stats, social play, linked platforms, and even targeted offers become part of your profile. That means your digital identity is just as important as your gamer tag. Mistakes here can expose your account to unwanted risks, such as phishing, identity theft, or oversharing. By taking a proactive approach to your privacy settings, you’re effectively controlling your account’s visibility and the footprint of your data. Think of it as choosing who sees your high-score highlights and who doesn’t. EA’s Commitment to Player Privacy You can learn how EA handles player information through “Investing in Privacy and Security” commitments. EA's global privacy program adheres to recognized best practices, ensuring that “privacy-by-design” is integrated into all games, services, and operations. This means EA provides notice of its data practices, offers users choices, and grants rights such as access, correction, and deletion of personal information. For us, gamers, that means the studio isn’t just collecting data for the sake of it; they claim to be mindful of scope, minimize processing where possible, and maintain safeguards against unauthorized access. Real Control: Adjusting Your Privacy Settings On your EA Account, you’ll find the “Security & Privacy” tab. This is where you take action. You can control how your data is used internally and by third parties, download a copy of your data, or request deletion of your account data. How to update your EA Account privacy settings Investing in Privacy and Security Online Security Newsletter - Volume 10 Quiz101Views9likes9CommentsEA Forums Online Security Newsletter - Volume 9
Hello everyone, and welcome to the 9th edition of the EA Forums Online Security Newsletter. It’s October Cybersecurity Awareness Month. We’ll revisit key topics from previous editions to refresh our knowledge and prepare for this month’s optional challenge. Staying secure is essential and should be a priority in every online interaction or purchase. As usual, if you share your experiences or take a quiz, you’ll receive a unique badge on the forums as a token of participation. Now is a good time to introduce this month’s additional, optional challenge. Since October is Cybersecurity Awareness Month, let’s promote online security even more: talk about online safety with your family and those most vulnerable, like your grandparents or kids. Exchange experiences with friends and share the tips you use every day. You can use the information in this newsletter or other resources (check the InfoHub). And, most importantly… Stay safe! Cybersecurity Awareness Month Downloading games Download apps and games only from official stores. Check reviews and ratings, and review requested permissions. Keep your operating system and apps updated, use antivirus software, and avoid illegal “cracked” versions, which often carry malware. Keeping your account secure Use strong, unique passwords and a password manager. Enable Two-Factor Authentication (2FA), such as Google Authenticator (biometric options are often supported). Watch for phishing: verify senders, avoid suspicious links or attachments, and never share personal information. Secure your email, the gateway to many accounts, by enabling two-factor authentication (2FA), monitoring activity, and using encryption for sensitive messages. Biometrics security Biometrics (fingerprints, facial recognition, voice) and passkeys use on-device cryptography to reduce or replace passwords. They resist phishing, brute-force attacks, and password theft while enabling faster logins. Devices store encrypted templates, not raw fingerprint or face images, helping protect security and privacy even if a device is compromised. Online purchases Buy games and currency from official stores or verified sellers; avoid offers that seem too good to be true. Enable two-factor authentication (2FA) on your accounts and use trusted payment methods (e.g., PayPal, Google Pay) with buyer protection. Keep your system and antivirus up to date. Be wary of social engineering: double-check links, verify senders, and remember that legitimate support will not contact you through unofficial channels. Password creation psychology People often prioritize convenience over security, opting for simple or familiar passwords (such as birthdays, names, or team names), reusing them, or following predictable patterns. To strengthen security, use passphrases with unrelated words, employ mnemonics, store unique and complex passwords in a password manager, and update them periodically. Psychology of phishing Phishing exploits the principles of urgency, authority, curiosity, rewards, and social proof. Counter it by pausing when a message sparks excitement or panic, verifying claims via official channels (not embedded links), checking sender details and branding, and treating unsolicited gifts or windfalls as suspicious. If a message seems to come from a friend but feels off, confirm through a separate, trusted channel. In short: slow down, verify independently, and think before you click. Security vulnerabilities A security vulnerability is a flaw that attackers can exploit to steal data, disrupt services, or gain unauthorized access, distinct from cheating, which manipulates in-game mechanics. If you discover a vulnerability in an EA game or service, report it via the Security Vulnerability Submission form on the EA Security website. Include the product, platform, version, discovery time, impact, reproduction steps, and any supporting evidence. EA evaluates reports using CVSS and a four-tier severity scale (Critical, Important, Moderate, Low), alongside the STRIDE model. Cheating or account issues should be reported via in-game tools or EA account support, not through this form. European Cybersecurity Awareness Month Cybersecurity Awareness Month CISA National Cybersecurity Alliance How to keep your EA Account secure Online Security Newsletter - Volume 9 Quiz307Views21likes15CommentsEA Forums Online Security Newsletter - Volume 8
Welcome to the 8th edition of our monthly newsletter on online security for gamers. This month, we'll take a closer look at the topic of cloud security. Many of you are already familiar with the cloud, but some might still be wondering what it actually is and why it matters. As always, we encourage you to share your security experiences with us—not only related to the cloud but also in general. Before diving into the main topic, I’d like to highlight last month’s edition, where we discussed security vulnerabilities, which are often confused with in-game cheating. If you haven’t had a chance to catch up, you can find the link to past issues here. We also invite you to participate in the conversation, share your stories, and test your knowledge with a short quiz based on this month’s release. Every participant will receive a unique participation token in the form of a forum badge. Stay safe! What does it mean that data is stored in the cloud? The cloud is a network of interconnected servers across the globe. Instead of owning a server yourself, you can “borrow” storage, bandwidth, or computing power from these providers. While the provider is responsible for securing the hardware, you are responsible for protecting the data you upload by keeping your accounts, passwords, and devices secure. How secure is the cloud? Technology giants like AWS and Google invest billions in physical and digital security. Physical measures include multiple layers of on-site protection, redundancy, and trained personnel. Digital measures cover DDoS mitigation, strong encryption, and continuous monitoring. In short, the infrastructure itself is highly secure, but the human side (your credentials and devices) remains a key responsibility. Who uses cloud solutions? Cloud services are everywhere. On the consumer side, tools like OneDrive and Dropbox make it easy to store files. On the enterprise side, companies like Netflix, Spotify, and of course EA, rely on the cloud to deliver seamless entertainment to millions of users worldwide. What about cloud gaming? Cloud gaming allows you to stream game titles directly to almost any screen, your TV, phone, or PC, without needing high-end hardware. The game runs on remote servers, while you interact through streaming. Remember, even though the game isn’t running locally, your account security is still crucial. Always enable MFA/TFA and connect only through trusted networks. Cloud backup Want to preserve your favorite Battlefield moment or months of progress in The Sims 4? Follow the 3-2-1 rule: Keep 3 copies of your data, On 2 different types of storage, With 1 copy in the cloud. This strategy minimizes the risk of losing your important files and ensures your memories stay safe. What is the cloud? Xbox - What's the difference between cloud gaming and remote play? How to keep your EA Account secure Online Security Newsletter - Volume 8 Quiz338Views13likes13CommentsEA Forums Online Security Newsletter - Volume 7
Welcome to another summer issue of our newsletter (for those in the Northern Hemisphere). Last month, we continued our series on phishing from a psychological perspective. This approach, which began two issues ago with a look at password creation, offers valuable insights into how bad actors operate. If you missed the previous issues, be sure to check them out - they’re definitely worth reading! EA Forums Online Security Newsletter - Volume 5 EA Forums Online Security Newsletter - Volume 6 This month, we focus on the important topic of reporting vulnerabilities in EA games and products. We recently published the Vulnerability Disclosure Hall of Fame, recognizing researchers who helped patch security issues in EA products or games during the past quarter. What is a security vulnerability, and how does it differ from cheating in a game? How can you report a security vulnerability in an EA game or service, and what information should you provide? You’ll find answers to these questions in the Security Focus section of the newsletter. As always, you can earn a unique forum badge by sharing your experiences in the newsletter comments or by taking the quiz. Stay safe! What is a Security Vulnerability? A security vulnerability is a weakness in a system that an attacker could exploit to cause harm, like stealing information or disrupting services. This is different from cheating in a game, which involves a player unfairly manipulating game rules for personal gain within the game itself, rather than exploiting a flaw in the underlying software. If I've found a Security Vulnerability, how do I report it? To report a security vulnerability in an EA game or service, you should fill out the Security Vulnerability Submission form on the EA Security Website. When submitting a report, include details such as the affected game or product, platform, version, time of discovery, what the vulnerability allows, steps to reproduce it, and any supporting evidence like screenshots or sample code. How does EA classify reported Vulnerabilities? EA classifies the severity of reported vulnerabilities using industry standards like the CVSS scoring system and a four-tier scale (Critical, Important, Moderate, Low), with the most severe issues requiring little or no user interaction to exploit. The impact of each vulnerability is further assessed using the STRIDE Security Model, and each report is carefully triaged and investigated by EA’s security team. Can I report cheating in-game through the Security Vulnerability Submission? Short answer - NO. Reporting cheating or account issues is handled separately from security vulnerabilities; cheating should be reported through in-game tools, and account security concerns should be addressed via EA’s account management resources. EA Coordinated Vulnerability Disclosure Hall of Fame What to do if you find a vulnerability in an EA game or product Report cheating, harassment, and illegal content Online Security Newsletter - Volume 7 Quiz480Views18likes15CommentsEA Forums Online Security Newsletter - Volume 6
Before we begin this issue’s regular sections, we want to thank everyone who participated in the discussion in the previous edition. Your shared experiences and kind words of appreciation mean a lot to us. 🥰 In this issue, we’ll again examine phishing methods from a psychological perspective, exploring why they are so effective and how we can better protect ourselves. Phishing isn't just about dodgy links; it's about exploiting fundamental human tendencies. Scammers are master manipulators, playing on our emotions, our desire for efficiency, and even our inherent trust. When you understand the psychological levers they pull, you gain a powerful advantage in spotting and avoiding their traps. 🤓 If you missed the previous edition, you can find it [here]. As always, joining the discussion or solving the quiz will earn you a token of participation in the form of a unique badge on the forum. 🤠 Stay safe! The Psychology of Phishing The Lure of Urgency and Scarcity, aka Fear of Missing Out Phishers often create a sense of immediate crisis or limited-time opportunity (e.g., "Your account will be suspended in 24 hours!" or "Exclusive limited-time skin unlock!"). This triggers our primal fight-or-flight response, bypassing rational thought and pushing us to act without deliberation. The fear of loss (of access, of a rare item) is a powerful motivator. When you feel a sudden surge of urgency or excitement from an unexpected message, stop and take a deep breath. A legitimate service will rarely demand immediate action without prior warning. Verify independently through official channels, not by clicking links in the suspicious message. Authority Bias Humans are conditioned to respect and obey authority figures. Phishers expertly mimic legitimate sources like game developers, platform support, or even government agencies. The use of familiar logos, official-sounding language, and seemingly authentic sender addresses exploits our tendency to trust perceived authority without question. Never assume legitimacy based solely on appearance. Always cross-reference. If you receive an unexpected email from "EA Support," don't click a link in the email. Instead, open your browser and manually navigate to EA's official support website to log in or check your account. The "Intriguing Mystery" Phishing Our brains are wired to seek out novelty and resolve unknowns. Phishers exploit this by sending messages that pique our curiosity (e.g., "See who's talking about you!" or "Your private photo has been leaked!"). The desire to know, to uncover the "secret," overrides caution, leading us to click. Before clicking on anything that triggers intense curiosity, engage your critical thinking. Is this too good to be true? Does it make sense that I would receive this message? If it sounds sensational or unbelievable, it likely is. Reward Phishing We often feel a subconscious obligation to repay a favor or respond positively to someone who has given us something. Phishers leverage this by offering enticing "rewards," "freebies," or "exclusive access" (e.g., "Claim your free legendary loot box!"). The desire to accept the perceived gift can blind us to the underlying danger. While it's nice to receive gifts, be highly suspicious of unsolicited windfalls, especially those requiring you to click a link or provide personal information. Legitimate giveaways from reputable companies will always direct you to their official website or have a clear, secure claiming process. If you didn't enter a contest, you didn't win. The "Everyone is doing it" Phishing Humans are social creatures, and we often look to the actions of others to determine what is correct or safe. Phishers can create a false sense of social proof by impersonating friends, guildmates, or popular streamers, often sending messages like "Hey, check out this amazing new game!" or "I just got this awesome item using this link, you should too!" This can lead us to believe that if others are clicking, it must be safe. Even if a message appears to come from a trusted friend, consider the context and how they usually communicate. If it seems out of character, or if the link is suspicious, contact your friend through a separate, verified channel (e.g., a direct message on a platform you know is secure, or even a quick call) to confirm. Stay vigilant! Pause, verify, and think critically before clicking on unexpected links or acting on urgent messages—protect yourself from phishing scams! How to avoid phishing Online Security Newsletter - Feedback Form Online Security Newsletter - Challenge Creation Interest Form Online Security Newsletter - Volume 6 Quiz579Views14likes20CommentsEA Forums Online Security Newsletter - Volume 5
Welcome to all our readers - whether you're a long-time subscriber or joining us for the first time—for the latest edition of our newsletter! This month, we invite you to engage in a conversation about security, our featured topic, and much more. Each edition is an opportunity to share your security tips, experiences, or insights with us. In last month’s edition, we explored the critical topic of safe online transactions. With the summer promotions season fast approaching, now is the perfect time to refresh your knowledge or check out our tips if you haven’t already. We also introduced the latest updates to EA’s flagship anti-cheat system, EA Javelin. If you’re unfamiliar with EA Javelin, we encourage you to revisit last month’s newsletter to learn more. This month, we’re exploring the fascinating topic of passwords from a psychological perspective. Why do we choose certain passwords over others? What motivates our choices? And what strategies can help you create strong, secure passwords? You’ll find answers to these questions and more in the Security Focus section. As always, your participation in the newsletter—whether through comments, quizzes, or sharing your experiences—earns you a participation token: a unique badge on the forum. Don’t miss out! We would also like to highlight recent software blocks in EA Javelin. AntiCheatWard from EA's anti-cheat team shared that the Disc-Soft block was implemented due to cheat-like scripts circulating in the ReWASD community, which automate actions like recoil control and skill-based challenges in games. While EA Javelin Anticheat supports legitimate remapping tools like Steam Input and Microsoft's Keyboard Manager, Disc-Soft's attempts to bypass anti-cheat checks and its tolerance of these scripts led to blocking their virtual hardware and drivers. We encourage you to uninstall the software and provide feedback to the vendor, with hopes that changes in their practices could allow for more targeted blocks in the future. You'll find the link to the full article in the InfoHub Section. Stay safe! The Psychology of Password Creation In today's digital age, passwords are crucial for safeguarding our personal and professional information. Yet many people struggle with creating and remembering secure passwords. This challenge is deeply rooted in human psychology and impacts how we choose and manage our passwords. Cognitive Load and Memory It is human nature to simplify complex tasks, which leads to choosing passwords that are easy to remember. As a result, simple choices can be made, such as using sequential numbers, common words, or birthdays. These elements reduce cognitive load, but at the same time, they compromise security. Familiarity Bias People tend to choose passwords that are familiar or meaningful to them. It can be the names of loved ones, favourite sports teams, or phrases that are familiar to you. While these choices make passwords easier to remember, they also make them easier to guess. Risk Perception Many users underestimate the risk of cyber threats, believing that they are unlikely targets. This perception leads to less rigorous password practices, such as using the same password across multiple accounts or opting for simple, easily cracked passwords. The Role of Emotion Emotional attachment can play a significant role in password creation. People often choose passwords that evoke positive feelings or memories, which makes them easier to recall. However, emotional passwords can be predictable for anyone familiar with the user. Social Influence Social factors, such as advice from friends or media, can impact password choices. Recommendations to use complex passwords might be acknowledged but not always implemented due to the inconvenience of remembering them. Strategies for Improvement Use Passphrases Combining unrelated words into a passphrase increases complexity while remaining memorable. Leverage Mnemonics Creating a mnemonic device can help recall complex passwords. Employ Password Managers These tools reduce the burden of remembering multiple passwords while ensuring they are strong and unique. Periodic Password Updates Changing passwords can mitigate risks associated with compromised credentials. But don't make it a burden, as accourding to NIST research over complicating the password changing process might have opposite effect. Online Security Newsletter - Feedback Form Online Security Newsletter - Challenge Creation Interest Form EA Javelin Anticheat & Recent Software Blocks Online Security Newsletter - Volume 5 Quiz699Views13likes17CommentsEA Forums Online Security Newsletter - Volume 3
Hello everyone, 👋 Welcome to Volume 3 of the EA Forums Online Security Newsletter!🎉 Number 3 is special in the cybersecurity field, so we can treat this edition as quite special. Why is the number 3 special, you ask? There are many different approaches in cybersecurity that address fundamental aspects. Make your own research and let us know your findings!🧐 Speaking of fundamentals, last month we covered the basics of online safety. It’s a reminder not to overlook the most crucial aspects of your online life! If you missed Volume 2 or need a refresher, the link is here. This month we’ll cover the interesting topics of biometrics, passkeys, and the passwordless approach to online safety. As always, by interacting with the newsletter through participating in the quiz or sharing your experiences in the comments, you’ll receive a unique forum badge! Stay safe! What is biometrics? Biometric authentication uses your biological traits—fingerprint, face, or voice—to verify your identity. OK, and passkeys? Passkeys are cryptographic keys stored on your device, removing the need for traditional passwords entirely. Why should I care? Both biometrics and passkeys provide a seamless and secure way to log in, eliminating weak passwords susceptible to cracking, phishing risks, and brute force attacks. What are other benefits of biometrics and passkeys? First, there is no need to type your password anymore, nor use additional TFA. Another significant benefit is hardened phishing resistance. Even if someone gets hold of your password, they can't steal your fingerprint. Additionally, biometric data can't be guessed or cracked through brute force attacks. Alright, but what if someone gets my device? Biometric data is encrypted and stored securely on your device, not in a central database. Even if a hacker accesses your device, they won’t be able to extract your biometric information. Does my device keep a record of my fingerprint? Your device keeps a biometric value of your fingerprint, face, or voice, which is then encrypted. Your device does not store your actual fingerprint or photo of your face (apart from your photo reel). FIDO Alliance - industry standards for passwordless authentication NIST - Biometric security Electronic Frontier Foundation - Digital privacy Online Security Newsletter - Feedback Form Online Security Newsletter - Challange Creation Interest form Online Security Newsletter - Volume 3 Quiz542Views15likes11CommentsEA Forums Online Security Newsletter - Volume 2
Hey everyone, welcome to the second edition of our newsletter dedicated to online safety for gamers. Last month, we examined security measures designed to protect us from malicious programs that can appear when we are not careful when using our phones, tablets, and computers. We also looked at this topic from the perspective of protecting the youngest from the dangers lurking online. If you have not yet had time to read the previous edition, you can find the link here. In this edition, we want to remind you of the basic rules of security for your online account, which you use for games and more! As always, for participating in the newsletter, whether by sharing your experiences with us or by completing the quiz, you will receive a participation token - a unique badge on the forum. Stay safe! Basic rules of security for your online account. Strong, Unique Passwords Think of your password as the key to your digital vault. A strong password is long, complex, and unique. It should mix uppercase and lowercase letters, numbers, and symbols. Use hard-to-guess information instead of common choices such as "123456" or "password," and avoid words that are easy to guess, such as birthdays and names like "Daniel93." However, remembering numerous complex passwords can be daunting. You can store your passwords securely, and they'll fill in automatically with password managers. Using them, you can generate strong passwords and prevent using the same password twice. Two-Factor Authentication (TFA) Two-Factor Authentication adds an extra layer of security by requiring a second form of verification. Google Authenticator is a popular choice that generates time-based codes, ensuring only you can access your accounts. Google Authenticator and other apps now support seamless device integration and offer biometric options, making 2FA quicker and more secure. Guarding Against Phishing Phishing is a deceptive attempt to steal your data. Always verify the sender's email address and look for typos, grammatical errors, or suspicious links. Use multi-factor authentication for extra security. Keep software updated and employ strong, unique passwords. Be cautious with attachments and never share personal information. Trust your instincts; if it feels off, it probably is. Securing Your Email Your email is a gateway to many of your accounts. Enable two-factor authentication for your email, and regularly review your account activity. Use encryption tools for sensitive communications and be wary of unsolicited requests for personal information. Many companies partner to ensure the highest level of security. You can read about EA's cooperation with Google in our news section "Keeping your EA account safe by working with others." This partnership addresses cases where email accounts tied to EA Accounts were compromised, allowing attackers to take over the EA Account and other valuable internet accounts connected to that email. EA has been working closely with Google to address this quickly and safely through their Cross-Account Protection program. Google shared more about this partnership in a recent post here! How to turn on EA Login Verification Where can I find my backup codes? How to update your EA Account Positive Play Charter Report cheating, harassment, and illegal content How to avoid phishing Online Security Newsletter - Feedback Form Online Security Newsletter - Challange Creation Interest form Online Security Newsletter - Volume 2 Quiz517Views16likes17CommentsEA Forums Online Security Newsletter - Volume 1
We're starting the year with a few changes to adapt to the transfer to the new forums. You'll notice a slight change in the naming of the newsletter and the badges. The newsletter will now be released in volumes every month. As usual - you can still receive badges for participating in volumes 1-12. I want to dedicate this month's subject to my nephew, who inspired me by asking some questions that intrigue him a lot—he just got his first PC and has many questions. So, let's start with the basics and answer one of his many questions: How do you download games safely? Let's consider why this is so important. Before diving into the world of games, everyone needs to download them first—and there's a right and wrong way to do this first step. The right way is safe for both the user and their device. Knowing a few simple rules can help us avoid problems and enjoy games stress-free. Those rules are especially crucial for young gamers and inexperienced parents, as it's easy to stumble upon unsafe sources or harmful apps. But I believe that even more experienced users can refresh or even update the "database". I'll share some tips and real-life examples that might be helpful. Don't forget to check them out and talk with your daughters, sons, nephews, nieces, grandparents, and parents. Okay, let's say it in a simple way: It will benefit everybody. How do you download games and applications safely? Download only from trusted sources Always download apps and games from official stores, such as Google Play, the App Store, or the Microsoft Store. Unknown sources may offer infected files that can harm your device. Check reviews and ratings Before downloading a new app, it's a good idea to read other users' reviews and check ratings. Apps with lots of positive reviews are usually more trustworthy. Beware of app permissions Before you install a new app, check what permissions are required. If a flashlight app wants access to your contacts and messages, it may be suspicious. Keep your apps and operating system up to date. Use antivirus software Installing antivirus software on your device can help detect and remove malware. Beware of "Cracked" versions Downloading “cracked” versions of games and applications is illegal and very risky. Such files often contain viruses and other malware. By following these tips, you can enjoy your favorite apps and games without worry! Stay safe and have fun! How to turn on EA Login Verification Where can I find my backup codes? How to update your EA Account Positive Play Charter Report cheating, harassment, and illegal content How to avoid phishing Online Security Newsletter - Feedback Form Online Security Newsletter - Challange Creation Interest form Online Security Newsletter - Volume 1 Quiz488Views18likes14Comments
