Tom Tovar
Thinking Differently - How to Make Money from Cyber Attacks & Cheats
#1about 3 minutes
Rethinking cyber attacks as a revenue opportunity
Instead of blocking all attacks, consider the user's intent and transform security events into monetization moments.
#2about 4 minutes
Understanding the scale and speed of mobile app attacks
Mobile apps are attacked within milliseconds of being published, with a significant percentage of the user base under attack at any given time.
#3about 2 minutes
Monetizing users on gray market gaming platforms
Instead of blocking users on emulators like BlueStacks, partner with the platform to charge a bounty for each player you allow.
#4about 3 minutes
Turning memory editing cheats into paid upgrades
When a player uses a tool like Game Guardian to edit memory for in-game currency, offer them the option to purchase those points legitimately.
#5about 2 minutes
Converting advanced cheaters into subscribers
For users employing advanced tools like Lucky Patcher, offer a subscription model that legitimizes their enhanced gameplay as a premium feature.
#6about 3 minutes
Creating a pro league for automated bot users
Channel users who run automated bots into a separate 'pro league' where they can compete against other bots, creating a new competitive tier.
#7about 2 minutes
Knowing which attacks should not be monetized
Distinguish between users trying to enhance their experience and malicious actors committing fraud or identity theft, which must always be blocked.
#8about 3 minutes
Implementing a framework for attack monetization
A successful monetization strategy requires a framework to detect attacks, provide telemetry data, and give developers control over the business logic outcome.
#9about 3 minutes
Q&A on common attacks and detection methods
The most common mobile gaming attack is memory editing, and reliable defense involves detecting the patching methods used by attackers on both the app and the defense itself.
Related jobs
Jobs that call for the skills explored in this talk.
VECTOR Informatik
Stuttgart, Germany
Senior
Kubernetes
Terraform
+1
ROSEN Technology and Research Center GmbH
Osnabrück, Germany
Senior
TypeScript
React
+3
Matching moments
04:57 MIN
Increasing the value of talk recordings post-event
Cat Herding with Lions and Tigers - Christian Heilmann
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
02:44 MIN
Rapid-fire thoughts on the future of work
What 2025 Taught Us: A Year-End Special with Hung Lee
03:15 MIN
The future of recruiting beyond talent acquisition
What 2025 Taught Us: A Year-End Special with Hung Lee
04:22 MIN
Why HR struggles with technology implementation and adoption
What 2025 Taught Us: A Year-End Special with Hung Lee
04:27 MIN
Moving beyond headcount to solve business problems
What 2025 Taught Us: A Year-End Special with Hung Lee
03:48 MIN
Automating formal processes risks losing informal human value
What 2025 Taught Us: A Year-End Special with Hung Lee
Featured Partners
Related Videos
Outsmarting the System: What Game Cheaters Can Teach Us About Cyber Security
John Romero
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
Cracking the Code: Decoding Anti-Bot Systems!
Fabien Vauchelles
Security Pitfalls for Software Engineers
Jasmin Azemović
Skynet wants your Passwords! The Role of AI in Automating Social Engineering
Wolfgang Ettlinger & Alexander Hurbean
It's a (testing) trap! - Common testing pitfalls and how to solve them
Ramona Schwering
Cyber Security: Small, and Large!
Martin Schmiedecker
Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?
Tino Sokic
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.



Cognizant
Barcelona, Spain
Java
Android



Instaffo GmbH
Azure
Burp Suite
Network Security
Microsoft Active Directory


