Boss Key’s multiplayer shooter LawBreakers has officially shut down

Your daily selection of the hottest trending gaming news!

According to (This article and its images were originally posted on Gamasutra September 18, 2018 at 10:01AM.)

Boss Key Productions’ ill-fated multiplayer shooter LawBreakers has been shut down. The studio revealed the game would be laid to rest back in June, and last Friday the time came to switch off the lights for good.

Despite being generally well-received, LawBreakers struggled to find an audience since launching in August 2017.

Publisher Nexon blamed its misfortune on the arrival of PlayerUnknown’s Battlegrounds, which released around the same time and became an instant hit.

“The timing of LawBreakers‘ launch turned out to be unfortunate, specifically because the blockbuster PC online game PlayerUnknown’s Battlegrounds came out right about the same time,” commented Nexon exec Shiro Uemera.

The shooter’s inability to find a foothold also spelled disaster for developer Boss Key, which has since closed its doors after making a last ditch attempt to stay in business with free-to-play battle royale effort, Radical Heights.

|

  • Got any news, tips or want to contact us directly? Feel free to email us: esistme@gmail.com.

To see more posts like these; please subscribe to our newsletter. By entering a valid email, you’ll receive top trending reports delivered to your inbox.

__

This article and images were originally posted on [Gamasutra] September 18, 2018 at 10:01AM. Credit to the original author and Gamasutra | ESIST.T>G>S Recommended Articles Of The Day.

 

Donations are appreciated and go directly to supporting ESIST.Tech. Thank you in advance for helping us to continue to be a part of your online entertainment!

Hacked webcams that helped shut down the internet last week are being recalled 

Chinese electronics company Hangzhou Xiongmai is recalling its webcams in the US following last week’s massive distributed denial-of-service attack that shut down multiple websites, including Github, Amazon, and Twitter. Some security researchers, including security firm Flashpoint, blamed the attack on Xiongmai’s lagging security practices and use of a default username and password in its software and camera components. That weakness, and similar weaknesses in other IoT products, allowed criminals to create a massive botnet of compromised connected devices. Xiongmai told the BBC that its webcams didn’t make up the majority of the devices in the botnet, however.

The DDoS attack relied on a malware called Mirai to compromise connected devices that use default passwords and usernames. (Friendly reminder: always change your connected device’s username and password!) Unidentified attackers assembled those infected devices into a botnet to target Dyn, a DNS service provider, on Friday, as well as security blogger Brian Krebs. Mirai’s source code was publicly released earlier this month, which researchers said would lead to higher profile attacks. So far, Mirai has infected at least 493,000 devices. Before the source code was released, only 213,000 devices had been compromised. This is likely only one of many DDoS attacks we’ll see as Mirai continues to search out and exploit vulnerable devices.

Join our fans by liking us on Facebook, or follow us on TwitterGoogle+feedlyflipboardand Instagram.

Check out our Flipboard magazine ESIST  If you enjoy reading our posts. All of our handpicked articles will be delivered to the flipboard magazine every day.

Original article posted on The Verge

 

by