Blog Posts Tagged with "Sony"

Ffc4103a877b409fd8d6da8f854f617e

Treasury Imposes Sanctions Against the Government of The Democratic People’s Republic Of Korea

January 02, 2015 Added by:InfosecIsland News

In response to the Government of the Democratic People’s Republic of Korea’s numerous provocations, particularly the recent cyber-attack targeting Sony Pictures Entertainment and the threats against movie theaters and moviegoers, President Obama today signed an Executive Order (E.O.) authorizing the imposition of sanctions against the Government of North Korea and the Workers’ Party of Korea...

Comments  (1)

Ab28a67c637101abd994329b9bf494e8

Eat. Pray. Love. – Three Words that Comply with Sony’s Password Policy

January 01, 2015 Added by:Scott Garber

While evaluating the Sony hack and explosion of related press, our team discovered an eerie tie-in to the titles and taglines in Sony Pictures massive movie library, which might have been an early indicator of the inevitable breach.

Comments  (1)

306708aaf995cf6a77d3083885b60907

Indicators of Compromise for Malware Used by Sony Attackers

December 21, 2014 Added by:Mike Lennon

Indicators of Compromise (IOCs) related to the Sony cyberattack that should be added to network security solutions to determine whether they are present on a network.

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Report: Malware Creation Hit Record High in 2011

January 31, 2012 Added by:Headlines

The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Information Security Events from 2011

January 03, 2012 Added by:Headlines

As 2011 was such an eventful year where security is concerned, no doubt many readers will point to numerous instances where they feel an episode was overlooked that should have been included in the top ten - but hey, you have to draw the line somewhere...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Biggest Security Events of 2011

December 16, 2011 Added by:Headlines

"Sony went out of its way to keep customers in the dark for the majority of the outage and when it did address the issue, it presented misinformation and blamed everyone but itself..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Top Cyber Criminal Busts of 2011

December 08, 2011 Added by:Headlines

"A torrent of attacks from groups like Anonymous, LulzSec, Goatse Security, and Antisec has made it a busy year for cybercrime investigators. While there are plenty of elusive hackers that will forever manage to outrun the law, the good guys scored some impressive arrests..."

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Game On: Twelve Tips for Safer Online Gaming

November 09, 2011 Added by:Kelly Colgan

It was only six months ago that Sony made headlines with reports of two major data breaches. Taken together, they served as a jarring reminder — or for many people, as a wake-up call — to the security risks inherent in online gaming...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Biggest Cyber Attacks Of All Time

November 01, 2011 Added by:Headlines

The Original Logic Bomb: Without sending a missile or any other explosive device, the US blew up a Siberian gas pipeline which was described by an air force secretary as "the most monumental non-nuclear explosion and fire ever seen from space..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Taps Weatherford as Cybersecurity Lead

October 21, 2011 Added by:Headlines

"DHS says the newly created cybersecurity position will allow the department to better carry out its mission to create a safe, secure and resilient cyberspace... Weatherford will focus on ensuring robust cybersecurity operations and communications resilience for DHS..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Sony Hacked Again... ESI to the Rescue?

October 14, 2011 Added by:Rafal Los

Getting hacked isn't necessarily Earth shattering anymore. Enterprises need to make their peace with fact that they're going to have to live with data breaches and hacks. The secret to surviving is having a well-formed Enterprise Security Intelligence strategy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Networks Compromised with Brute-Force Attack

October 12, 2011 Added by:Headlines

Sony Corporation have yet again been breached, compromising 60,000 PlayStation and 33,000 Online Entertainment accounts. The source of the attack is unknown, but reports in indicate that the infiltrators used login credentials from an unnamed third-party to gain access to the systems...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LulzSec Member Indicted for Sony Systems Hack

September 27, 2011 Added by:Headlines

The indictment alleges that Kretsinger and other coconspirators obtained confidential information from Sony Pictures’ computer systems using an “SQL injection” attack against its website, a technique commonly used by hackers to exploit vulnerabilities and steal information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Corporation Taps Philip Reitinger as First CISO

September 06, 2011 Added by:Headlines

The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Most Expensive Network Attacks in History

August 18, 2011 Added by:Headlines

Quantifying the cost of a cyber attack is admittedly subjective on some levels given that the scope of the impact may not be readily reportable and collateral damage is difficult to pinpoint, but the author does manage to assemble a viable list of the most devastating network attacks...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

How a Major Data Breach is Like Quicksand

July 01, 2011 Added by:Rafal Los

Put yourself in the shoes of a few of the major organizations that have had high-profile data breaches due to compromised applications or web sites lately... the more they struggle and fight, the worse things appear to get. Why is this? Remember that there are no castle walls...

Comments  (1)

Page « < 1 - 2 - 3 - 4 > »