101010-weak-security-on-accounts

Content
{| style="width: 100%;"

"Fake Curse Client". Rumors stay rumors untill there is proof, there is also a rumor there is a magnificent beast roaming in Loch Ness. There are many threads about that too. Nobody has actually come up with proof Curse steals your passwords, so all those people that got hacked just want to blame something, but 9/10 they just got bruteforced because their password is crackable in a few minutes by a PC. The only way to get infected is if you let yourself be infected, download from shady websites, open .exe you don't actually know where it's from (especially accepting UACs from programs you don't know). Running javascripts on shady websites that you just accepted installing RATs. That sort of stuff. If the hacker can still infect your PC without you actually doing anything, believe me he has no need for someones Wildstar account. To the OP: Scan your system with Malwarebytes, I cannot stress this enough, it's truly a great anti-malware program, scan your system for keyloggers and other malware.


 * }
 * }

{| style="width: 100%;"

I had reason to reach out to support the other day with an authenticator problem (changed phones). They got back to me in less than an hour and the whole issue was completed in a just a few hours.


 * }
 * }

{| style="width: 100%;"

If the email address he/she uses for WildStar is exclusive to WildStar, then one would have to agree. However if the email address he/she uses for WildStar is NOT exclusive to WildStar, then all bets are off. Especially if it is also used for other forums and/or social media outlets like Twitter, Facebook, Youtube, EBay, Reddit, Craig's List, etc ... and even more especially if those accounts or their posts are somehow linked back to WildStar. I would even go so far as to recommend a unique email for Curse ... just in case. Is this a pain in the ass? You bet. But the pain of consequence hurts a lot worse than any inconvenience prevention might cause.


 * }
 * }