Application Security
6/25/2010
09:17 AM
50%
50%

China Tightens Online Gaming Regulations

The Ministry of Culture's Interim Measures for Internet Games in an attempt to protect minors from "unwholesome" content.

China's Ministry of Culture has issued what it calls the "Interim Measures for Internet Games" in an attempt to protect minors from "unwholesome" content.

The rules make up the first official document to deal with China's flourishing online gaming industry and will come into effect as of August 1, 2010. It will apply to social networking games as well as all domestic and imported massive multiplayer online role-playing games (MMORPG), which are wildly popular in China.

The measures were introduced after an unprecedented rise in the number of game players in April. The state administrator, China Internet Network Information Center (CNNIC) reported 105 million users of online games. As of August 1, all players must register with their real name and valid ID. Online game companies must also self-censor their content to bring it in line with the new regulations. Furthermore all imported games will be screened for suitability.

Some observers believe the new regulations are vulnerable to abuse. For instance, there is little to stop a minor using someone else's identity to register a new account. However, the MOC is aware of this and is considering using technology found in every internet café, such as webcams, for visual authentication.

The regulations point out the need to protect children from unsuitable material, officials said. There is also a total ban on minors handling virtual currency, used by many online games, particularly those created by Tencent, the company behind China's most popular instant messaging system, QQ. It is also a top game provider, and derives much of its revenue from selling virtual items as part of its games.

Virtual currency has been very big business in the past, with people spending more and more virtual currency (paid for with real cash) to get the latest and best virtual gaming equipment.

The new rules also try to ban obligatory hostilities between players set by the game administrators, which had been common practice to make the games more exciting. Also under the knife is pop-up advertising designed to entice netizens into playing the games.

At the same time, as regulations tighten in certain areas, they are loosening in others. Gaming licenses can now be obtained at the provincial level, rather than national level, for a maximum of three years. This "decentralization," together with a lower minimum registered capital, will lower the threshold to enter the market, which should be good news for small and mid-size businesses around the country. Previously they had needed permission from the Ministry of Culture in Beijing to enter the lucrative market.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1375
Published: 2015-01-28
pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not properly restrict access to the upload functionality, which allows remote attackers to write to arbitrary files.

CVE-2015-1376
Published: 2015-01-28
pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com.

CVE-2015-1419
Published: 2015-01-28
Unspecified vulnerability in vsftp 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.

CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.