Blog Posts Tagged with "Sony"

69dafe8b58066478aea48f3d0f384820

LulzSec Vows to Continue "Until We're Brought to Justice"

June 20, 2011 Added by:Headlines

"We've been entertaining you 1000 times with 140 characters or less, and we'll continue creating things that are exciting and new until we're brought to justice, which we might well be. But you know, we just don't give a living frak at this point..."

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Sony Breach Highlights Secure Password Storage

June 08, 2011 Added by:Emmett Jorgensen

Secure password storage is crucial to any secure system. From sites such as Sony to operating systems and data backups on encrypted hard drives, if the password is in plain text your account and data is not safe. After all, why try to guess a password if you can just copy and paste it?

Comments  (0)

6d117b57d55f63febe392e40a478011f

Sony Stock Hammered in Wake of Security Breaches

June 06, 2011 Added by:Anthony M. Freed

The unrelenting security incidents plaguing Sony, compounded by the recent earthquake and Tsunami in Japan, has worked to undermined shareholder confidence in the entertainment giant, and the result is a steady decline in the company's share price...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

LulzSec Hackers Hit FBI Affiliate InfraGard

June 06, 2011 Added by:Headlines

LulzSec, the hacker collective who recently claimed responsibility for attacks against Sony and PBS, hacked networks belonging to the Atlanta chapter of the FBI affiliate InfraGard and defaced the organization's website, as well as exposing the group's email database...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Believe It or Not: Hackers Hit Sony Networks Again

June 03, 2011 Added by:Headlines

"SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities... From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks?"

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Game Over: Cloud Computing and the Sony Breach

June 02, 2011 Added by:Kelly Colgan

We often use words like “robust,” “comprehensive,” and “strong” to describe security programs. Nice as that may sound, security isn’t only the strength of a system, but about the mindset of the people working it. Have they asked all the questions? Have they covered all their bases?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Rep to Testify for Congress About Network Breach

June 01, 2011 Added by:Headlines

"We do not know who was responsible for the intrusion; nor do we know precisely the amount of information that was taken... These gaps in what we know are not for lack of trying by experts, but rather an unfortunate testament to the skill of those who perpetrated the attacks..."

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Security and Due Diligence

May 28, 2011 Added by:Chris Blask

Behind all the technology and corporations and globe-spanning markets and networks there are individual human beings. The actions and intent of those individuals shines through the layers between them and the rest of us like arc lights through kleenex. There is no replacement for intent...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Sony's Catastrophic Security Problem - The End Game

May 26, 2011 Added by:Rafal Los

Hacking incidents tend to have a short-term impact on a business and rarely impact the long-term viability of a large organization. What I suspect may happen here is an event or exfiltration of data so catastrophic that it may actually impact Sony's long-term viability...

Comments  (2)

Dd9902bc56a9d85cdc62c00083ea4871

Human Error Leads to Third Strike for Sony

May 25, 2011 Added by:Katie Weaver-Johnson

Organizations who are unable to measure situational awareness at the individual level will continue to suffer expensive breaches. All individuals need to understand their individual roles and responsibilities for protecting sensitive and personal information...

Comments  (3)

53692ae1a8e713373b8a487ce89ee3e2

Affected by the PSN Breach? Here’s What to Do Next...

May 24, 2011 Added by:Tom Eston

Sony has not confirmed or denied that credit card data was stolen; however, as a customer you should take the following precautions when using a PS3 or any game console, including XBOX Live and Nintendo’s Wii and DS systems...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Networks Hit Twice More By Hackers

May 23, 2011 Added by:Headlines

"It is nearly impossible to run a totally secure Web presence, especially when you are the size of Sony. As long as it is popular within the hacker community to expose Sony's flaws, we are likely to continue seeing successful attacks against them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Offers Insight On Sony PSN Breach

May 19, 2011 Added by:Headlines

"The depths they went indicates that this hack wasn't arbitrary... It seems likely to me that Sony got attacked through its web services first, such as the blog, and it opened up the doors to the rest of Sony's servers..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony PlayStation Network Hacked Once Again

May 18, 2011 Added by:Headlines

"The hack involves the PSN web-based password reset page, where it’s said anyone can change someone else’s password using their PSN account email and date of birth—both details possibly obtained by hackers in the mid-April breach..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Japan Says 'No' to Sony PlayStation Network Relaunch

May 16, 2011 Added by:Headlines

"As of May 13, Sony was incomplete in exercising measures that they said they will do on the May 1 press conference," said Kazushige Nobutani, Japan's director of media and content in the country's Ministry of Economy, Trade, and Industry...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Breaches Upon Breaches: Sony, X-Factor, LastPass...

May 16, 2011 Added by:Robert Siciliano

It is important to observe basic security precautions to protect your identity. However, the safety of your information with corporations and other entities that you transact business with is very often beyond your control...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »