dcsimg

Resident Evil 8 just the latest game plagued by fake demos and early access scams

There’s been a number of scams targeting fans of major upcoming video game releases over the last week or two. Why is this happening, and what can you do to ensure both you and your children avoid such fakeouts? Preview power: the 80s and 90s Back in the 80s, games reviews were only really found in dedicated gaming magazines like ZZap!64 or Amstrad Action. A couple of magazine publishers had … [Read more...]

How to Run Among Us on a Mac

Unfortunately, Among Us is not officially supported on Mac. Fortunately, the game does work on Windows using Parallels® Desktop for Mac. Parallels Desktop runs Steam on Windows, which means if your computer meets the requirements you can run the game, even on a Mac. For those casual gamers out there, that don’t necessarily have a super gaming PC, Parallels does a great job of running quite a few … [Read more...]

How to Run the New Age of Empires III DE on a Mac with Parallels Desktop

I have written several times in the Parallels blog about my most favorite game franchise of all time: Age of Empires (Here, here, and here). Since Age of Empires is a Windows game, when I want to play it, I use a Windows virtual machine (VM) in Parallels Desktop – and that is why I write about Age of Empires here.  The last few years have seen a real resurgence in Age of Empires. (“There … [Read more...]

A week in security (August 17 – 23)

Last week on Malwarebytes Labs, we looked at the impact of COVID-19 on healthcare cybersecurity, dug into some pandemic stats in terms of how workforces coped with going remote, and served up a crash course on malware detection. Our most recent Lock and Code podcast explored the safety of parental monitoring apps. Other cybersecurity news Under lock and key: Researchers showed how the sound … [Read more...]

A brief history of video game saves and data modification

Games consoles and handhelds have always been an interesting battleground for hacking activities. The homebrew scene for using hardware in interesting ways has a long and varied history, especially where porting games to run on different platforms is concerned. Tampering with games while playing them to gain a distinct advantage has always been frowned upon by the majority of players and … [Read more...]

Discord users tempted by bots offering “free Nitro games”

The last few weeks have seen multiple instances of problematic bots appearing in Discord channels. They bring tidings of gifts, but the reality is quite a bit different. Given so many more young kids and teens are at home during the current global lockdown, they may well see this scam bouncing around their chat channels. Worried parents may want to point them in this direction to learn about the … [Read more...]

Fake Elder Scrolls Online developers go phishing on PlayStation

A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via Playstation messaging. This particular phishing attempt is notable for ramping up the pressure on recipients—a classic social engineering technique taken to the extreme. A terms of service violation? In MMORPG land, the scammers take a theoretically plausible deadline, crunch it into … [Read more...]

Parallels Desktop 15: 10 Features in 10 Minutes (OK, more like 8 minutes!)

I spent most of August traveling around Asia and presenting demonstrations of Parallels Desktop® 15 for Mac to various audiences, including technical press, bloggers and Parallels partners. The new Parallels Desktop feature that received the most positive reaction? The conversion to Metal and support for DirectX 11 in Windows. Also well received was the ability to play Xbox games in Windows 10 … [Read more...]

Video game portrayals of hacking: NITE Team 4

Note: The developers of NITE Team 4 granted the blog author access to the game plus DLC content. A little while ago, an online acquaintance of mine asked if a new video game based on hacking called NITE Team 4 was in any way realistic, or “doable” in terms of the types of hacking it portrayed (accounting for the necessary divergences from how things would work outside of a scripted, plot-goes-here … [Read more...]