Watch out! There's Malware Lurking in Hogwarts Legacy

 


The presence of Hogwarts Legacy is used by cybercriminals to carry out their actions. Even the hackers were already on the loose before the game made by Avalanche Software was officially released last February 10.

This was revealed by Kaspersky researchers recently. They found many sites offering Hogwarts Legacy downloads for PC. However, when downloading cracked games, gamers actually download malware or unwanted software on their devices.


Spread programs can range from adware that displays advertisements on users' screens to trojans that gather information about users surreptitiously.



"Games about the world of Harry Potter haven't even come out yet, but they have become a real phenomenon, talked about by many gamers around the world. It is very popular among those who, like me, grew up on books about boy wizard stories, as well as among the younger generation ," says Olga Svistunova, security expert at Kaspersky.


With such a large fan base, this game has become a target for cybercriminals who want to capitalize on the popularity of this world-famous saga. Our advice is always to be vigilant and only download games from official app stores and don't forget to use a trusted security solution."



To avoid falling victim to malicious programs and scams, Kaspersky

provide the following suggestions:


It is safer to buy and download games only from official sites.

Don't trust prize offers like expensive new games. Most often these are scams.

If possible, protect your account with two-factor authentication. For others, browse account settings.

Use strong and unique passwords for each account. That way, even if one of your accounts gets stolen, the rest won't be affected.

It's safer not to use the same password for online games that you use for other services;

Using a strong and reliable security solution will be of great help to you, especially if it won't slow down the computer while playing. But at the same time, it will protect you from all possible cyber threats.

Previous Post Next Post

Contact Form