Is Pokemon Go a Security Threat?
“A user is not only dealing with Niantic and the “official” game servers, but also a host of unofficial (and generally unauthorized) servers that might come knocking at their Google information.“
There are a few ways to fight back against these risks. Creating a secondary “dummy” Google account specifically for use with the game and unaffiliated with your general account is one way to lock down your vital (and personal) information. A second method would be to bypass Google entirely and create a Pokemon Go! account that might serve as your login. As always, should you choose to download auxiliary apps to go with the game you should do your research. Make certain the apps are from trusted sources (such as Google Play or the Apple App store). While shopping for apps, look for ones that boast many positive reviews rather than ones that seem to be in use by a small handful of users. Do a bit of snooping about the company running the helper app; can you find a website for them online? Do they seem to have a line of reputable products? Don’t trust your information to just anyone; and always be wary when it comes to your privacy.
Domain is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at (888) 330-8088 or send us an email at firstname.lastname@example.org for more information.
Was this article helpful?
For more information about how Domain Computer Services can benefit you.
The complexity and sophistication of ransomware attacks continue to rise.We've seen a dramatic increase in people reaching out to us in the last few weeks because of attacks that their current IT Service Provider couldn’t handle. But even more dangerously, we’re...
We are excited to announce Domain Computer Services ranked in the top 5 on the 2019 NJBIZ list of Top Cybersecurity Firms in New Jersey.
Do you really need a Penetration Test? The short answer is no. Well first off, what is a penetration test anyway? You might’ve heard that this is the best way to detect any vulnerabilities that you may have, but actually, that’s not the case. Let’s dive into some of the downsides of doing a pen test.